TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Launch HN: SubImage (YC W25) – See your infra from an attacker's perspective

135 点作者 alexchantavy3 个月前
Hi HN! I’m Alex, and along with my co-founder Kunaal, we are thrilled to introduce SubImage (<a href="https:&#x2F;&#x2F;subimage.io">https:&#x2F;&#x2F;subimage.io</a>): a tool that lets your security team fix issues before they’re found by attackers. Teams use SubImage to map their infrastructure and emulate adversary behavior. Here’s a video of how I would use it to hack our own company: <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=P_meu4_aIVA" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=P_meu4_aIVA</a>.<p>SubImage is our hosted offering built on top of Cartography (<a href="https:&#x2F;&#x2F;github.com&#x2F;cartography-cncf&#x2F;cartography">https:&#x2F;&#x2F;github.com&#x2F;cartography-cncf&#x2F;cartography</a>), the open source security graph that we created at Lyft in 2019, originally shared on HN here: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=19517977">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=19517977</a>. You can think of us as an open-core Wiz alternative.<p>In 2016, I worked on Microsoft’s Azure Red Team, where we built an infra mapping service to find the shortest paths to exploit our targets. We were so effective that the Blue Team wanted it too. In 2019, I joined Lyft, where we applied the same ideas to AWS and beyond, helping build and open-source Cartography. Over the past six years, it’s been incredible to grow the community and see over 70 companies (that I know of) use it.<p>Kunaal and I first worked closely together in 2020 when we helped bootstrap Lyft’s vulnerability management program and used Cartography as its backbone: <a href="https:&#x2F;&#x2F;eng.lyft.com&#x2F;vulnerability-management-at-lyft-enforcing-the-cascade-part-1-234d1561b994" rel="nofollow">https:&#x2F;&#x2F;eng.lyft.com&#x2F;vulnerability-management-at-lyft-enforc...</a>. This is actually where the name SubImage comes from: Lyft services are made up of one or more “SubImages”, and modeling this properly was such a memorable engineering challenge that we decided to name our company after it.<p>Cartography pulls metadata from multiple sources -- SaaS, cloud service providers, a company’s internal services -- and writes it to a graph database. This simple technique is incredibly powerful in modeling otherwise unseen misconfigurations and attack paths in areas like access permissions, networking, and software vulnerabilities.<p>SubImage picks up where Cartography leaves off: it’s a fully-hosted solution that provides specific recommendations for the problems it finds. The fix-action depends on company size: small teams might run AWS CLI commands, while larger orgs require automated infrastructure-as-code pull requests.<p>Here’s a video demo showing how we can use SubImage to understand and take action if our Stripe API key is unexpectedly used: <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=RBCr35hb5Hk" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=RBCr35hb5Hk</a>.<p>SubImage also provides a natural language interface to quickly answer questions about our infra: <a href="https:&#x2F;&#x2F;imgur.com&#x2F;a&#x2F;subimage-natural-language-interface-query-graph-QL2ico5" rel="nofollow">https:&#x2F;&#x2F;imgur.com&#x2F;a&#x2F;subimage-natural-language-interface-quer...</a>.<p>Security is a competitive space, but we have a few differentiators:<p>First, we allow a very deep level of customization where the security team can enrich their graph with their own internal data, not just data from the major cloud providers. If it can be expressed as structured JSON, you can graph it; here’s a demo: <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=rvwDJoZaO_w" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=rvwDJoZaO_w</a>. This flexibility is needed to answer questions like: Which storage buckets contain PII? Who owns them? Who’s on-call for <a href="https:&#x2F;&#x2F;example.com&#x2F;api&#x2F;payment" rel="nofollow">https:&#x2F;&#x2F;example.com&#x2F;api&#x2F;payment</a>? Which company director owns the most risk?<p>Since it’s built on Cartography, teams can also just write custom plugins in Python if they’d like: <a href="https:&#x2F;&#x2F;cartography-cncf.github.io&#x2F;cartography&#x2F;dev&#x2F;writing-intel-modules.html" rel="nofollow">https:&#x2F;&#x2F;cartography-cncf.github.io&#x2F;cartography&#x2F;dev&#x2F;writing-i...</a>.<p>Second, our core principle is actionability. Security teams drown in alerts. SubImage traces paths from critical assets to the most exploitable misconfigurations, helping teams cut through the noise and prioritize real threats.<p>Finally, we’re built on open source. We created Cartography and as it improves, so does SubImage. Cartography is a CNCF project (<a href="https:&#x2F;&#x2F;eng.lyft.com&#x2F;cartography-joins-the-cncf-6f6b7be099a7" rel="nofollow">https:&#x2F;&#x2F;eng.lyft.com&#x2F;cartography-joins-the-cncf-6f6b7be099a7</a>), which means that it is full open source and will remain so.<p>Going forward, we’re maintaining Cartography while launching SubImage as a fully managed offering. Our roadmap includes Access Management (prune excessive permissions and enforce security invariants, Change Tracking (detect and alert on infra changes that introduce risk), and Cloud &amp; SaaS Misconfigurations (expand visibility, including vulnerability management).<p>Thanks for reading! If this sounds interesting, try out <a href="https:&#x2F;&#x2F;github.com&#x2F;cartography-cncf&#x2F;cartography">https:&#x2F;&#x2F;github.com&#x2F;cartography-cncf&#x2F;cartography</a>.<p>It’s an honor to share SubImage with HN, especially having followed projects here for over a decade. We’d love to hear your questions, feedback, and the challenges you face in security and infra!

15 条评论

bavarianbob3 个月前
Awesome project!<p>As someone deeply familiar with this problem (ex-JupiterOne), I&#x27;d caution against asserting that &#x27;deep level of customization&#x27; is a differentiator. Your buyer (CISO) and userbase (Sec Engs) are drowning. They (and I) don&#x27;t want yet another product to build on top of. This is a key reason why Wiz is so successful -- an operator can turn Wiz on and immediately receive value, no adjustments or additions needed.<p>I&#x27;d strategically focus on making the &#x27;actionability&#x27; part the cornerstone of the product and really become obsessed with making that part of your product incredible. The Goliath-killing story you need will be formed by figuring out how to get your product to the point where someone can turn it on and immediately receive value for the most impactful security problems first (ex: Log4J) and the total surface area of problems the product solves for second.
评论 #43164796 未加载
评论 #43162362 未加载
mdaniel3 个月前
I was watching a competitor(?) of yours a few years ago who were trying to integrate <a href="https:&#x2F;&#x2F;github.com&#x2F;WithSecureLabs&#x2F;IAMSpy#iamspy">https:&#x2F;&#x2F;github.com&#x2F;WithSecureLabs&#x2F;IAMSpy#iamspy</a> with Cartography to have more insight into what, actually, the IAM Roles could do<p>Do you have similar plans or are those kinds of things left as an &quot;exercise to the reader&quot; via your Intel Plugins link? I do see <a href="https:&#x2F;&#x2F;cartography-cncf.github.io&#x2F;cartography&#x2F;modules&#x2F;aws&#x2F;schema.html#awsprincipal-awsrole" rel="nofollow">https:&#x2F;&#x2F;cartography-cncf.github.io&#x2F;cartography&#x2F;modules&#x2F;aws&#x2F;s...</a> but I also see <a href="https:&#x2F;&#x2F;github.com&#x2F;cartography-cncf&#x2F;cartography&#x2F;blob&#x2F;0.100.0rc1&#x2F;cartography&#x2F;intel&#x2F;aws&#x2F;iam.py#L369">https:&#x2F;&#x2F;github.com&#x2F;cartography-cncf&#x2F;cartography&#x2F;blob&#x2F;0.100.0...</a> so it&#x27;s hard to know what level of insight one wishes to support out of the box versus the localstack model of &quot;open core, advanced features are $$$&quot; type deal
评论 #43164817 未加载
nodesocket3 个月前
Looked at your video demo, does SubImage actually recommend changes and generate terraform? For example instead of exposing 80&#x2F;443 to the EC2 instance, deploy a ELB in-front of it that listens on 80&#x2F;443 publicaly and only allow the ELB to forward traffic to the ec2 instance. Also, utilize attach role to the ec2 instance to avoid storing AWS credentials in environment vars, though if the instance was compromised an attacker could still access the s3 bucket.
评论 #43162254 未加载
1899-12-303 个月前
Given that this is a paid product, are you liable if the chatbot misrepresents the data?<p>website(on firefox) nitpicks<p>- The handle_complexity.png image is too small to read and can&#x27;t be zoomed unless opened in another tab.<p>- The background effect is in the foreground of chatbot_cropped_gif.gif<p>- The yaml schema text should have a background like the rest of the text boxes
评论 #43162044 未加载
asaiyer3 个月前
Wow this library has a lot of history being developed at Lyft! Have you seen a good response to the paid offering? I suppose all the OSS users self hosting will switch over!
jvstokes3 个月前
This is cool, and really makes sense for large organizations. Do you foresee a release for smaller enterprises (something as simple as a lightweight aws integration?)
评论 #43162700 未加载
评论 #43162694 未加载
tsunego3 个月前
Actionability &gt;&gt;&gt; observability<p>If you can pull this off, you will have a great time
评论 #43165433 未加载
jc_8113 个月前
Looks very cool! Wiz is a beast at the moment so I will be watching closely to see if you (or anyone else really) will be able to go up against them
financetechbro3 个月前
Congratulations on the launch! Can you please provide some details on your business model?
评论 #43168827 未加载
newgo3 个月前
How come things like this are not built into most cloud providers?
评论 #43164781 未加载
needHackerNews3 个月前
Congrats on the launch!
lobster23423 个月前
Hi, interresting goal that you have in mind.<p>Working in a huge enterprise, I see a clear benefit for this kind of product, as we are really struggeling to keep track.<p>I understand that you are very early in boot-strapping, but what I was missing while skimming over the videos and links and webpage is a better high-bird view or contextualization of the apporach.<p>I was considering a demo, but the two options (chat and quick chat) were a bit unclear to me what they would archive &#x2F; how they are structured.<p>Again, I have full understanding that you are still working on this. Good luck with this project.
评论 #43169532 未加载
aghilmort3 个月前
absolutely awesome -- huge need
pcgubi983 个月前
Looks great. Sent you a DM.
badmonster3 个月前
Congrats on the launch!