BSidesLuxembourg 2025

The Firewall Project: Open Source, Shift-Left, Security Platform
2025-06-19 , Secondary stage

Cyberattacks and data breaches are a common occurrence these days. Many businesses struggle to prioritize cybersecurity due to limited resources and budgets. Advanced security tools are often out of reach for organizations without significant cyber funds.

The Firewall Project, a open-source & community powered appsec platform, is dedicated to providing accessible, effective and enterprise grade cybersecurity solutions. Our mission is to empower organizations of all sizes with robust security tools that are both free, scalable and user-friendly.
In this talk, we're excited to unveil The Firewall Project’s Appsec Platform, our innovative secrets detection, software composition analysis, web application scanner and remediation product. Our Platform is designed to seamlessly integrate into development workflows, empowering security teams to proactively identify and mitigate security incidents hidden within your code.
Our Platform is packed with enterprise-grade features, making it a powerful tool for security teams. These features include incident tracking, customizable dashboards, automated remediation workflows, seamless integrations with popular development tools, and single sign-on (SSO) capabilities. By providing these advanced features, The Firewall Project not only simplifies the detection and remediation process but also enables security teams to effectively demonstrate progress to management and promote a shift-left security culture.
Join us as we demonstrate how the appsec platform by The Firewall Project can be easily configured and implemented within your organization. Discover the benefits of shifting left with our platform, including enhanced internal security, improved visibility, and streamlined collaboration between development and security teams.


The Current State of Cybersecurity

Increasing frequency and severity of security breaches.
Businesses struggle to keep up with evolving threats.
Many organizations can't afford advanced security solutions.
Security becoming a luxury rather than a necessity.

Security in the Age of AI: When Code Moves Faster Than Controls

While developers can now write code 10x faster using AI coding assistants like GitHub Copilot, security teams are struggling to keep pace.
Security teams are losing visibility into what's actually going into production, with each development decision potentially introducing unknown vulnerabilities or compliance risks.

Challenges in Remediation

Who is the owner of this asset in my organization’s SDLC?
Which teams should be involved? What are the best ways to collaborate with them?
Can I detect and remediate new issues across SDLC?
How do I manage the backlog of issues in my organization’s SDLC?

Introducing “The Firewall Project’s Appsec Platform”

Unconditional Visibility - Gain full visibility without bothering anyone
Risk Based Prioritisation - Use context to help devs understand the impact
Democratization for Developers/PMs - Empower devs to be proactive and take the ownership of their applications
Simplifying Remediation Process

Demo

Deployment - Docker Compose, CFT, Cloud Marketplaces
Configuration - VCs(Github/Bitbucket/Gitlab), Cloud(AWS/Azure/GCP) & Alerts(Slack/Jira), RBAC
Asset Inventory - Repos, Web Application, Secrets, Vulnerabilities
Runtime Scans - PR and post-commit scans via webhooks

Incident Management

Live Dashboards

Automated Remediation Workflows

One-click allowlisting for false positive management.
Grouping of assets to establish ownership.
SLA and business context powered dynamic scoring for risk based prioritisation.

Real-World Use Cases

Git PAT Token Exposure: Imagine a scenario where a GitHub Personal Access Token (PAT) is accidentally stored in a private repository for a React.js project. Due to a misconfiguration, this token becomes accessible to the public via the client-side browser. With The Firewall Secrets, this kind of exposure can be detected early in the Software Development Life Cycle (SDLC), preventing potentially catastrophic breaches.
Vendor Compromise: Consider a case where a vendor, who has access to one of your private repositories, gets compromised. This breach could lead to the leaking of secrets and sensitive data. In such situations, a fast and efficient patch management system is crucial to identifying other services impacted by the breach. The Firewall Platform's incident tracker ensures that you're able to respond quickly and effectively to such incidents.
Insider Threats: In a recent incident at a prominent organization, the IT team discovered through logs that an employee, before leaving the company, downloaded a repository containing sensitive secrets. The immediate priority was to identify the compromised services and initiate a rapid incident response. With The Firewall Secrets and The Firewall Platform, you can identify exposure across your organization and take swift action to mitigate the risks.

Roadmap

Addition of AI powered DAST Capabilities
AI assistant
Container Images Scanning Capabilities

Contributors

Conclusion

Shifting left to prevent security issues early in development.
Operationalising security using risk based prioritization and comprehensive owner-to-asset mapping can significantly improve the efficiency of security teams
We envision a world where every business, regardless of size or budget, has access to state-of-the-art cybersecurity. Where security isn't a luxury, but a fundamental right. Where we stand united against cyber threats, leaving no one behind.

Presentation for the talk:

https://docs.google.com/presentation/d/11nTQ9g1Xgm700dxAYqJEa6A8DsanA-qYScwc-aGDd_0/edit?usp=sharing

Important Links:

Website: https://thefirewall.org
Blogs: https://blogs.thefirewall.org
Github: https://github.com/TheFirewall-code/TheFirewall-Secrets-SCA
Documentation: https://docs.thefirewall.org
Youtube: https://www.youtube.com/@TheFirewallAppsecPlatform

Sparsh has over 5 years of experience in cyber security, research and product development. He has authored multiple security tools, advisories and articles. He has been invited to speak at various security conferences like Bsides Singapore, Bsides Ahmedabad, c0c0n, etc.

Lavlesh Joshi, sr. security engineer and building the open-source firewall project, with deep expertise in cybersecurity, cloud, infrastructure, and data security. His experience spans blue and offensive security roles, securing systems at scale and bridging the gap between security and engineering. He has contributed to cloud security, Kubernetes security, and DevSecOps initiatives, focusing on operationalizing security within CI/CD pipelines. Passionate about shift-left security, building open-source solutions to help teams seamlessly integrate security into development workflows, eliminate reliance on expensive tools, and drive real-world impact.