StackSage

StackSage

Run AWS waste, hygiene, security audits in GitHub Actions

dubeyamit1920
@dubeyamit1920
Last updated on Mar 5, 2026
Visit site
5PeerPush
PeerPush badge for StackSage

Follow on

About StackSage

StackSage is a privacy-first AWS audit platform that identifies cost optimization opportunities and security misconfigurations across your AWS infrastructure. Running entirely within your GitHub Actions environment, StackSage scans your AWS resources to detect idle instances, oversized resources, outdated configurations, and unused services, delivering actionable insights without ever transmitting your data to external servers. Core Capabilities: Cost Optimization Detection StackSage employs intelligent detectors across major AWS service categories: Compute: Identifies EC2 instances with <5% CPU utilization, detects opportunities to upgrade from older generation types (e.g., m4→m6i for 20-30% savings), and flags Lambda functions with minimal invocations. Storage: Discovers unattached EBS volumes, overprovisioned IOPS/throughput, gp2-to-gp3 migration opportunities (20% cost savings), and obsolete snapshots older than 90 days. Database: Detects RDS instances with low connection counts, unused read replicas, and oversized database configurations. Network: Finds idle NAT gateways (<1GB/day transfer), unused Elastic IPs, and underutilized load balancers with minimal request volumes. Other Services: Identifies unused CloudWatch log groups, idle ElastiCache clusters, empty S3 buckets with lifecycle policies, and DynamoDB tables in on-demand mode with predictable traffic patterns. Security & Compliance Beyond cost, StackSage provides posture detection for security best practices, identifying publicly exposed resources, overly permissive security groups, and configuration drift from AWS Well-Architected Framework principles. Privacy-First Architecture Zero Data Exfiltration: StackSage runs entirely in your GitHub Actions runner using temporary AWS credentials via OIDC (OpenID Connect). Your AWS data never leaves your infrastructure, no external API calls, no telemetry, no cloud backends. Short-Lived Credentials: Authentication uses GitHub's OIDC integration with AWS STS to generate 1-hour temporary credentials. No long-lived access keys required. Read-Only Permissions: Requires only IAM read permissions (ReadOnlyAccess + CloudWatchReadOnlyAccess) to describe resources and fetch CloudWatch metrics. Local Report Generation: HTML and JSON reports are generated and stored as GitHub Actions artifacts within your repository. Technical Implementation Deployment Model StackSage ships as a Docker container designed for GitHub Actions workflows. A typical setup: Runs on schedule (e.g., weekly) or manual trigger Assumes IAM role via OIDC Scans configured AWS regions Generates findings with evidence grades (A-F) Uploads report artifacts Configuration Flexibility Customize behavior via stacksage.yml: Exclusions: Skip specific resources, tags, regions, or entire detector types Thresholds: Adjust idle CPU percentages, unattached volume days, minimum savings amounts Tag Governance: Enforce required tags or exclude resources by tag patterns Budget Awareness: Configure CloudWatch query budgets to control API costs Detection Methodology Each detector assigns an Evidence Grade (A-F) based on CloudWatch metric confidence: Grade A: 14+ days of consistent metrics, high confidence Grade B: 7-14 days of data Grade C: 3-7 days, emerging pattern Grade D-F: Insufficient data or edge cases Estimated monthly savings calculated using real-time AWS pricing data. Reporting & Integration Output Formats HTML Report: Interactive dashboard with sortable findings, filterable by severity/service/region JSON Report: Machine-readable format for CI/CD integration and custom tooling Provenance Metadata: Includes CloudWatch query counts, budget consumption, and API error classifications Evidence Transparency Each finding includes: Resource ARN and tags CloudWatch metrics used for analysis Detection confidence level Estimated monthly savings in USD Actionable remediation steps Trial vs. Full Version: The trial version (stacksage_trial) includes 6 core detectors (EC2 idle, EBS unattached, NAT idle, RDS low connections, Elastic IP unattached, Lambda low invocations) with a 5-resource cap per detector. The full version includes 25+ detectors across all AWS services with unlimited resource scanning. Licensing & Support StackSage operates on a license-based model with trial evaluation available. For setup assistance, configuration guidance, or technical support, contact [email protected].

Product Insights

StackSage is a privacy-first AWS auditing tool that identifies cost optimization and security risks through GitHub Actions or local CLI execution. It monitors compute, storage, databases, and networking resources to detect idle assets and configuration drift without transmitting data to external servers.

  • Privacy-first architecture ensures AWS data never leaves the GitHub Actions environment or local infrastructure.
  • Comprehensive coverage across EC2, RDS, EBS, Lambda, and more with intelligent cost and security detectors.
  • Flexible deployment options including Docker-based CI/CD workflows and a direct pip installable CLI.
  • Uses OIDC and short-lived credentials with read-only permissions to enhance infrastructure security.

Ideal for: DevOps Engineers and Enterprises seeking to automate AWS cost optimization and security audits within their existing CI/CD pipelines while maintaining strict data privacy.

Screenshots

Screenshot 1 of StackSageScreenshot 2 of StackSageScreenshot 3 of StackSageScreenshot 4 of StackSage

Product Updates (3)

dubeyamit1920
@dubeyamit1920Mar 5, 2026

STACKSAGE is now pip installable!

Running AWS audit shouldn’t require CI pipelines and YAML gymnastics. Now it’s just: ``` pip install stacksage stacksage scan ``` In minutes, you’ll get: 🕵🏻 Security Posture Findings ⚡ Cost waste detections 📊 Estimated savings 🧠 Confidence backed insights 🔒 Runs locally, nothing shared No SaaS lock-in. No complex onboarding. Just clarity on your AWS bill. Go cast the spell. 🧙‍♂️✨ 👉 https://pypi.org/project/stacksage/ 👨🏻‍💻 Cli Reference: https://stacksageai.com/docs/cli-reference/ 🐞 Issues / Feature Requests/Questions: https://github.com/amitdubey428/stacksage-ai-stacksage-community/issues
Product had at the time: 11 upvotes • 3 comments • 6 followers • 5 PeerPush

Comments (0)

No comments yet. Be the first to share your thoughts!

dubeyamit1920
@dubeyamit1920Feb 15, 2026

StackSage product update: from “waste scan” → “architecture optimizer” 🚀

We’ve leveled up from “find obvious waste” to architecture-grade savings recommendations: v0.4.0: expanded coverage (DynamoDB, ElastiCache, CloudFront, Route53) + stronger CloudWatch-backed confidence v0.5.0: modernization moves: EC2 → serverless, Lambda → Graviton (arm64), RDS → Aurora Serverless v2 v0.6.0 (just shipped): containers! Added ECS inventory + detectors for EC2-backed ECS → Fargate and Fargate Spot (non-prod) with savings estimates Also cleaned up the site/docs to be more proof-first (fewer broken links, better light theme, clearer detector list). If you want, feel free to try the free trial run and let us know how it works for you!
Product had at the time: 10 upvotes • 1 comments • 5 followers • 4 PeerPush

Comments (0)

No comments yet. Be the first to share your thoughts!

dubeyamit1920
@dubeyamit1920Feb 4, 2026

🎯 v0.3.0 is LIVE

The biggest release yet. We didn't just add features, we rebuilt how StackSage shows you what's wrong with your AWS setup. What changed: 📊 Evidence-first reports: Every finding now shows you exactly which CloudWatch metrics we checked and why we flagged it 📋 Copy-paste remediation: One-click CLI commands. See an idle EC2? Here's the aws ec2 terminate-instances command ready to go ⚙️ stacksage.yml config: Exclude resources, adjust thresholds, filter by tags. Your rules, your way 🔍 New Detectors (5 shipped) EBS overprovisioned performance: Paying for 10,000 IOPS but only using 500? We'll tell you NAT Gateway idle detection: <1GB/day transfer? That's $30-45/month doing nothing Lambda low invocations: Functions called <10 times/day RDS low connections: Oversized databases with <10 active sessions Empty ALB/NLB target groups: Load balancers routing to... nothing 🛡️ Security Scorecard Now tracking 15+ posture checks across IAM, S3, VPC, and CloudTrail. Every audit gets a security score (0-100). Cost + Security in one scan. 📚 Documentation Website https://lnkd.in/d36SCijw is live with full setup guides, IAM policies, troubleshooting, and privacy architecture. Zero fluff, just what you need to get running.
Product had at the time: 2 upvotes • 1 comments • 2 followers • 3 PeerPush

Comments (0)

No comments yet. Be the first to share your thoughts!

Reviews (0)

No reviews yet. Be the first to rate this product!

Comments (2)

asupkay1124
@asupkay1124Feb 15, 2026

As someone with a lot of AWS infra this is interesting

dubeyamit1920
@dubeyamit1920Feb 16, 2026

@asupkay1124 Thanks! If you are interested for a free trial, do reach out to us at [email protected], I'm personally catering to referrals from peerpush!

dubeyamit1920
@dubeyamit1920Jan 8, 2026

Excited to launch StackSage 🚀 We help teams uncover hidden cloud waste, optimize costs, and get clear, actionable insights—using safe, read-only audits. Looking forward to feedback!

You may also like

Racoons.ai

Racoons.ai

Find out why your website isn't bringing in customers

1292PeerPush
🥉#3 of the Month
25
1
Loamly

Loamly

See the visitors ChatGPT sends you — they convert 4x

1164PeerPush
🥇#1 of the Week
30
$99MRR
3