Tarek Cheikh
Founder & AWS Cloud Architect
You're managing hundreds of AWS resources across multiple regions. Security vulnerabilities lurk in public S3 buckets, deprecated Lambda runtimes threaten compliance, and idle EC2 instances drain your budget. Meanwhile, you're drowning in manual checks, spreadsheet inventories, and alert fatigue.
What if I told you there's a better way?
Over the next 14 episodes, I'll unveil an arsenal of production-ready scripts that have saved organizations thousands of dollars and prevented countless security incidents. Each tool comes in two flavors: a CLI version for immediate investigations and a Lambda version for automated, scheduled monitoring.
This isn't just code dumping. Each episode dives deep into:
Each script serves dual purposes:
CLI Version: Perfect for:
Lambda Version: Ideal for:
Every Lambda version includes a secret weapon: parallel region processing. While traditional scripts crawl through regions sequentially, these implementations leverage concurrent execution for 85–90% performance improvements. When you're dealing with enterprise-scale AWS environments, this isn't just convenience — it's necessity.
These scripts have:
Episode 1: "Hunting Deprecated Lambda Runtimes — Before They Become Problems"
Discover how to systematically identify Lambda functions running on deprecated runtimes across all regions. We'll explore the security implications of outdated runtimes, build both CLI and automated Lambda solutions, and implement SNS alerting that keeps your team ahead of AWS deprecation timelines.
Spoiler: The Lambda version processes 16 regions in parallel, completing in seconds what used to take minutes.
Whether you're a security engineer hunting vulnerabilities, a DevOps practitioner optimizing costs, or an architect building compliance frameworks, this arsenal will transform how you manage AWS at scale.
Each episode includes:
This article is just the start. Get the full picture with our free whitepaper - 8 chapters covering IAM, S3, VPC, monitoring, agentic AI security, compliance, and a prioritized action plan with 50+ CLI commands.
Stop sending your IAM policies, CloudTrail logs, and infrastructure code to third-party APIs. Run LLMs locally with Ollama on Apple Silicon — private, offline, fast. Complete setup guide with AWS security use cases.
We obtained the actual compromised litellm packages, set up a disposable EC2 instance with honeypot credentials and mitmproxy, and detonated the malware. Full evidence: fork bomb, credential theft in under 2 seconds, IMDS queries, AWS API calls, and C2 exfiltration.
A deep technical breakdown of how threat actor TeamPCP compromised Trivy, pivoted to LiteLLM, and turned a popular AI proxy into a credential-stealing weapon targeting AWS IMDS, Secrets Manager, and Kubernetes.