Skip to content
View MellyFinnese's full-sized avatar
πŸš€
Brainstorming new ideas
πŸš€
Brainstorming new ideas

Block or report MellyFinnese

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
MellyFinnese/README.md
Typing SVG

πŸƒ Crypto πŸƒ SecOps builder Β· SBOM intelligence Β· Low-level, failure-obsessed


Current Pulse

  • 🎯 Current focus: AI-BOM Inspector – AI-powered SBOM risk & license scanner
  • πŸ”Ž Drawn to: firmware, reverse engineering, weird edge cases, failure paths
  • 🧠 Style: think like the attacker, build like the defender
  • πŸ“‘ Open to: collabs on security tooling, SBOM workflows, CI/CD security

I’ve seen the wrong side of security. Now I use that perspective to build tools that keep the blast radius small.

Quick Signal

GitHub Stats
GitHub Streak


🧨 Flagship – AI-BOM Inspector

From raw SBOMs to clear risk intel: vulnerable dependencies, license traps, and what to fix first.

πŸ” AI-BOM Inspector Details
🧾 Input CycloneDX / SPDX SBOMs
🧠 Output AI-ranked risk, reasoning, and prioritized recommendations (WIP)
πŸ›‘ Use Case Supply-chain security, SecOps, CI/CD gating
🧩 Roadmap GitHub Action · CI/CD blocking · dashboard
πŸ“‚ Repo πŸ‘‰ AI-BOM-Inspector

πŸ—‚ Project Shelf

  • πŸ§ͺ AI-BOM Inspector – AI x SBOM risk analysis & license inspection
  • πŸ›° Low-level / firmware lab – system internals, boot/OS experiments, failure hunting
  • βš™οΈ Clean utility – smaller but fully documented tool with tests (discipline over hype)
  • 🧱 Security toolkit skeleton – reusable template for future tools

πŸ—Ί AI-BOM Inspector – Flow from Code to Clarity

graph TD;
    A[SBOM: CycloneDX/SPDX] --> B[Parse & Normalize];
    B --> C[Risk Engine];
    B --> D[License Intel];
    C --> E[Score: Critical Β· High Β· Medium Β· Low];
    C --> F[Explain: CVEs Β· Maintenance Β· Exposure];
    D --> G[Detect: License Conflicts Β· Copyleft Issues];
    E --> H[CI/CD Gating];
    F --> I[Reports];
    G --> I;
    H --> J[GitHub Action / Pipelines];
Loading
  • Granular risk scoring (CVSS, maintenance, license risk, popularity, ecosystem health)
  • Explain every flag (CVE, abandonware, license conflict)
  • Remediation ideas and safer alternatives (where it matters)
  • GitHub Action to post risk intel directly on pull requests
  • CI/CD mode to block builds above a configurable risk threshold
  • Lightweight dashboard / TUI for dependency health over time

🧰 Skill Matrix

πŸ§ͺ Languages
  • Python – security tooling, CLIs, end-to-end workflows
  • Rust – performance and safety when I need both
  • C – where abstractions drop and the real behavior shows
πŸ›‘ Security / Domain
  • SBOMs (CycloneDX / SPDX) and supply-chain analysis
  • Dependency intelligence: risk, licenses, maintenance, ecosystem signals
  • CI/CD security hooks, GitHub Actions, risk-based gating
  • Applying an attacker mindset to build stronger defenses
βš™οΈ Ecosystem
  • Linux as the main lab
  • Docker for reproducible environments
  • GitHub Actions for continuous checks & automation
  • Issues / Discussions as live feedback loops

🧠 Philosophy

  • I don’t sanitize the story; I choose where the line is now.
  • I care about how systems really fail, not just how they’re supposed to work.
  • Curiosity fuels tools that reduce blast radius.
  • I’d rather ship one tool that actually protects people than a dozen forgettable scripts.
  • Aware of the dark, committed to pointing it in the right direction.

πŸ“ˆ Recently Shipped

  • βœ… Initial release of AI-BOM Inspector CLI
  • βœ… SBOM parsing + base risk highlighting
  • βœ… First external review integrated into roadmap (scoring, explainability, integrations)
  • πŸ”œ GitHub Action: auto-comment risk insights on PRs
  • πŸ”œ CI/CD risk threshold mode: fail builds when the dependency tree gets sketchy

πŸ›° Ops Log

Timeline
  • 2025-11 – AI-BOM Inspector tested by external users; workflow + feature ideas captured
  • 2025-11 – GitHub profile refocused around AI x security, supply-chain defense, low-level work
  • 2025-11 – Roadmap shaped: granular risk, explanations, remediation, GH Action, CI/CD
  • 2025-12+ – Focus: integrations, more real SBOMs, polished UX for teams

πŸ“Š GitHub Pulse

Activity Graph

Top Langs

🧾 Project Hygiene Checklist

  • LICENSE – clear, explicit (MIT / Apache-2.0 / etc.)
  • SECURITY.md – reported issues responsibly
  • CONTRIBUTING.md – open issues / PRs without wasting time
  • CODE_OF_CONDUCT.md – standard, but running a serious project
  • GitHub Actions workflow (tests / lint) + CI badge in README

🀝 Collaborate

  • Security tooling
  • SBOM workflows / supply-chain security
  • AI x SecOps

…I paired attacker perspective with disciplined defensive engineering.

Pinned Loading

  1. AI-BOM-Inspector AI-BOM-Inspector Public

    Security-focused AI stack analyzer that builds an AI-BOM (models + deps) and highlights real supply-chain risk.

    Python 1

  2. mellyfinnese.github.io mellyfinnese.github.io Public

    HTML

  3. Shadow-UEFI-Intel Shadow-UEFI-Intel Public

    UEFI / firmware inspection toolkit that parses images, baselines modules, and uses an AI layer to flag suspicious changes for human review. Defensive intel only.

    Rust 1