Developer Tools
Snyk Learn
Snyk Advisor
Code Checker
About Snyk
Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All service groups
Expand this section
AWS
All AWS service groups
Account Management
ACM
Amplify
API Gateway (REST APIs)
AppStream
AppSync
Athena
Batch
CloudFront
CloudTrail
CloudWatch
CodeBuild
Cognito
Config
DocumentDB
DynamoDB
EBS
EC2
ECR
ECS
EFS
EKS
ELB
EMR
ElastiCache
ElasticSearch
FSx
Glacier
Global Accelerator
Glue
IAM
Kinesis
KMS
Lambda
MQ
MSK
Neptune
QLDB
RDS
Redshift
S3
Sagemaker
Secrets Manager
SNS
SQS
SSM
Transfer
VPC
WAF
WorkSpaces
Expand this section
Azure
Expand this section
Google
Expand this section
Kubernetes
Report a new vulnerability
RULE
SERVICE GROUP
H
IAM access key generated for `root` user
IAM
H
IAM policy allows privilege escalation
IAM
H
IAM policy grants full administrative rights
IAM
H
IAM policy has a statement block with a wildcard action
IAM
H
IAM role can be assumed by anyone in the account or anyone in any account
IAM
H
The IAM role can be assumed by any service or principal
IAM
M
A support role has not been created to manage incidents with AWS Support
IAM
M
AWS IAM access key hasn't been used for at least 90 days
IAM
M
AWS IAM user password hasn't been used for at least 90 days
IAM
M
Broad IAM permissions in IAM policy
IAM
M
IAM Delegated admin is misconfigured
IAM
M
IAM password policy does not expire passwords within 90 days
IAM
M
IAM password policy does not prevent reuse of previously used passwords
IAM
M
IAM password policy does not prevent reuse of the four previously used passwords
IAM
M
IAM password policy does not require at least one lowercase letter
IAM
M
IAM password policy does not require at least one number
IAM
M
IAM password policy does not require at least one symbol
IAM
M
IAM password policy does not require at least one uppercase letter
IAM
M
IAM password policy does not require minimum password length of 7 or does not include alphanumeric characters
IAM
M
IAM password policy minimum password length is too short
IAM
M
IAM policy is attached to user
IAM
M
IAM principal has no permissions boundary
IAM
M
IAM principal has overly permissive permissions boundary
IAM
M
IAM role used for trust relationship does not have MFA or external IDs
IAM
M
IAM user does not have MFA (virtual or hardware) enabled
IAM
M
IAM user is not a member of at least one group
IAM
M
IAM user login profile does not enforce resetting the generated password
IAM
L
IAM policies allow broad list actions on S3 buckets
IAM