Skip to content
View Oluwatobi-Mustapha's full-sized avatar

Block or report Oluwatobi-Mustapha

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Oluwatobi-Mustapha/README.md

Hi, I'm Oluwatobi Mustapha

Multi-Cloud IAM Security Engineer | Non-Human Identity Specialist | Core OSS Contributor

I design and secure IAM architectures across distributed environments, enforcing strict least privilege for both human and machine identities.
Proud member of the AWS Community Builders and The Identity Underground.

Open Source Contributions

I contribute security fixes to enterprise identity infrastructure and cloud governance frameworks.

  • Keycloak (33k+ ★) Hardened OIDC compliance to guarantee stable federation with upstream IdPs, and enhanced OID4VCI flows for secure, decentralized enterprise architectures.

  • Authentik (24k+ ★) Patched a critical OAuth2 decoding flaw to eliminate false-positive application lockouts, delivering a fix critical enough for an immediate backport to the stable enterprise release.

  • Better Auth (27k+ ★) Delivered core security patches that eliminated severe OTP bypass vulnerabilities and enforced strict cryptographic validations to prevent active session hijacking.

  • Cloud Custodian (5.9k+ ★) Fixed a critical AWS IAM monitoring blind spot, restoring accurate AccessDenied telemetry required for multi-account enterprise compliance audits.

    My full open-source contribution log


Projects

  • Boundary – AWS JIT Access Broker
    Building a Just-in-Time access vending engine that reduces provisioning time from days to seconds while automatically generating artifacts required for SOC2 audits.

  • IAM Logic Fuzzer
    Security testing tool designed to surface hidden privilege escalation paths in IAM policies while helping validate compliance with CIS AWS benchmarks


Cloud & Infrastructure

AWS Cloud Kubernetes Microsoft Azure

Automation

Go Python Terraform

Identity & Access Management

AWS Cedar Azure Entra ID SPIFFE HashiCorp Vault


Certifications

AWS Solutions Architect – Associate Oasis Security NHI Certified HashiCorp Terraform Associate CompTIA Security+


Technical Focus

Identity: OIDC, SAML, SCIM
Policy & IaC: Policy-as-Code, Drift Detection
Kubernetes: RBAC, workload identity (mTLS)
Secrets: Vault-based lifecycle rotation


Open to Roles

Connect on LinkedIn

📧 Contact: oluwatobimustapha539@gmail.com

Pinned Loading

  1. boundary boundary Public

    Serverless Just-In-Time (JIT) access broker for AWS. Features Slack ChatOps, policy-as-code, and automated zero-trust revocation.

    Python 5 1

  2. iam-fuzzer iam-fuzzer Public

    Automated fuzzing tool for identifying AWS IAM logic flaws, and permission boundaries.

    Python 7

  3. oss-contributions oss-contributions Public

    A curated list of my merged open-source PRs.

    2