Skip to content
View salecharohit's full-sized avatar

Block or report salecharohit

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
salecharohit/README.md

Hi, I'm Rohit Salecha 👋

Principal Security Engineer · AI Security · DevSecOps · Cloud Infrastructure

Over a decade of experience evangelizing secure software development — from code to cloud. Currently focused on AI-driven security initiatives and hardening cloud-native infrastructure at scale.


Focus Areas

  • Application Security — Web, mobile, and API security
  • AI Security — Securing AI systems and using AI to enhance security workflows
  • DevSecOps — Embedding security into CI/CD pipelines and developer workflows
  • Cloud Security — AWS and GCP infrastructure hardening
  • Infrastructure as Code — Terraform, Kubernetes, and policy-as-code
  • Threat Modeling & Security Automation

Projects

Python CLI for sweeping GitHub organizations and user accounts with custom Semgrep rules. Like TruffleHog for secrets — but for any code pattern you define. Supports AI-powered triage via Claude, GPT, Gemini, and AWS Bedrock.

Companion repository for "Securing 4 C's of a Software Product — AWS Edition". A hands-on course covering Code, Container, Cluster, and Cloud security using GitHub Actions, Semgrep, OPA, Kyverno, Gitleaks, and more.

Terraform-based AWS playground for the S4CP curriculum. Covers IAM automation, multi-environment isolation, OIDC-based CI/CD, EKS with RBAC, Secrets Manager integration, and policy enforcement via OPA and Kyverno.

Spin up a fully configured Ubuntu security workstation on AWS EC2 in minutes. Comes pre-loaded with VSCode, Nmap, Nuclei, Semgrep, AWS CLI, and Terraform — with Route53 domain assignment and IP-restricted access.

Minimal Terraform configuration to provision AWS IAM resources for running GLM and other foundation models via AWS Bedrock — purpose-built for PentAGI, an autonomous AI penetration testing agent.


Tech Stack

Security: Semgrep · Trivy · Gitleaks · Nuclei · Nmap · OPA · Kyverno
Cloud: AWS · GCP · Terraform · Kubernetes · EKS
DevSecOps: GitHub Actions · OIDC · Docker · Helm
Languages: Python · HCL · Shell · JavaScript


Certifications

  • AWS Certified DevOps Engineer – Professional (2024)
  • AWS Certified Developer – Associate (2024)
  • Certified Kubernetes Administrator (2023)

Connect

LinkedIn Twitter Website Email

Pinned Loading

  1. devops devops Public archive

    Blogseries on DevOps

    Shell 13 55

  2. my-cloud-desktop my-cloud-desktop Public

    My Cloud Desktop based on Ubuntu

    HCL 5

  3. s4cp-playground s4cp-playground Public

    This Project is part of the S4CP Training accessible at [https://rohitsalecha.com/s4cp/](https://rohitsalecha.com/s4cp/)

    HCL 8 2

  4. s4cpbook s4cpbook Public

    Securing 4 C's of a Software Product

    JavaScript 5 5

  5. glm-pentagi-via-bedrock glm-pentagi-via-bedrock Public

    Terraform quickstart to provision AWS Bedrock IAM credentials for GLM Flash and other foundation models

    HCL 2

  6. pentagi pentagi Public

    Forked from vxcontrol/pentagi

    Fully autonomous AI Agents system capable of performing complex penetration testing tasks

    Go