Last night, I spent most of my evening coding a cloud function to import my Fitbit activity data into Firebase. But this morning, I deleted it. 🗑️

My initial excitement faded overnight, and I realized I wasn't sure what I wanted to do with the data in the first place. 🤷😴

#Fitbit #API #Firebase #CloudFunction #OAuth2 #CodingLife #DeveloperStruggles #DataDilemma #EarlyEnthusiasm #LostTrack #DeleteItAll #BackToTheDrawingBoard

Processed all the photos taken during our road trip through Norway and selected my favorites. Can't wait to see them published.

Follow my photography at @dvidschmdt and @[email protected].

#photography #norway #favorite #pixelfed #mastodon #fediverse #googlephotos #cloudfunction #automated

Cybersecurity experts have uncovered a significant vulnerability named ConfusedFunction in Google Cloud Platform's Cloud Functions service. This issue allows attackers to elevate their privileges, potentially accessing various services and sensitive data without authorization. When a Cloud Function is created or updated, a Cloud Build service account is automatically generated and linked to a Cloud Build instance. This service account possesses extensive permissions, which, if misused, can lead to unauthorized access to Cloud Storage, Artifact Registry, and Container Registry among others. Google has addressed this by changing the default behavior to use the Compute Engine default service account instead, though this does not retroactively apply to existing instances. Despite this fix, the deployment of a Cloud Function still necessitates assigning certain permissions to the Cloud Build service account, highlighting ongoing concerns about software complexity and inter-service communication in cloud environments.

https://www.tenable.com/blog/confusedfunction-a-privilege-escalation-vulnerability-impacting-gcp-cloud-functions

#cybersecurity #google #googlecloud #vulnerability #privilege_escalation #confusedfunction #cloudfunction #cloudstorage #cloudbuild #cloud #tenable

ConfusedFunction: A Privilege Escalation Vulnerability Impacting GCP Cloud Functions

Organizations that have used Google Cloud Platform’s Cloud Functions – a serverless execution environment – could be impacted by a privilege escalation vulnerability discovered by Tenable and dubbed as “ConfusedFunction.” Read on to learn all about the vulnerability and what your organization needs to do to protect itself.

Tenable®

Check it out; a #webpage served from a #serverless #function that's distributed on #IPFS and executed on someone else's computer that is NOT a big-tech corpo!

https://noisy-answer-late.functions.on-fleek.app/

This is a #fleekFunction running on the #fleekNetwork, a #web3 #blockchain project. The #HTML is a #SSR #webComponent rendered by @enhance_dev

#crypto #fleek #onFleek #fleekXYZ #aws #lambda #azure #cloud #cloudFunction #googleCloud

📢 Did you know you can write & run some #ApacheGroovy code online ❓

https://groovyconsole.dev

Code on #Github
https://github.com/groovy-console/groovy-web-console

▶️ Frontend: Google #AppEngine
▶️ Groovy runtime runners: Google #CloudFunction

You can also run your #SpockFramework tests!

🖖 Test often & prosper! 🖖

Groovy Web Console