Latest version: v0.2.0
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
A small utility to help do start, stop and tag actions in an IaC stack for cost optimization purpose.
No known vulnerabilities found