Developer Tools
Snyk Learn
Snyk Advisor
Code Checker
About Snyk
Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All service groups
Expand this section
AWS
All AWS service groups
Account Management
ACM
Amplify
API Gateway (REST APIs)
AppStream
AppSync
Athena
Batch
CloudFront
CloudTrail
CloudWatch
CodeBuild
Cognito
Config
DocumentDB
DynamoDB
EBS
EC2
ECR
ECS
EFS
EKS
ELB
EMR
ElastiCache
ElasticSearch
FSx
Glacier
Global Accelerator
Glue
IAM
Kinesis
KMS
Lambda
MQ
MSK
Neptune
QLDB
RDS
Redshift
S3
Sagemaker
Secrets Manager
SNS
SQS
SSM
Transfer
VPC
WAF
WorkSpaces
Expand this section
Azure
Expand this section
Google
Expand this section
Kubernetes
Report a new vulnerability
RULE
SERVICE GROUP
H
Obsolete EC2-classic resource in use
VPC
M
AWS default network ACL allows public access
VPC
M
AWS network ACL allows public access
VPC
M
AWS network ACL rule allows public access
VPC
M
AWS security group rule allows public access
VPC
M
Egress Rule Not Configured to Restrict Outbound Traffic
VPC
M
Public IPs are automatically mapped to instances
VPC
M
Security group description is missing
VPC
M
Security group rule allows open egress
VPC
M
The inline security group rule allows open egress
VPC
M
VPC default security group allows unrestricted egress traffic
VPC
M
VPC default security group allows unrestricted ingress traffic
VPC
M
VPC endpoint policy allows full access to service
VPC
M
VPC flow logging is not enabled
VPC
M
VPC network ACL allows ingress from '0.0.0.0/0' to port 22
VPC
M
VPC network ACL allows ingress from 0.0.0.0/0 to port 3389
VPC
M
VPC security group allows ingress from any address to all ports and protocols
VPC
M
VPC security group attached to EC2 instance allows ingress from '0.0.0.0/0' to all ports
VPC
M
VPC security group attached to EC2 instance permits ingress from '0.0.0.0/0' to port 389 (LDAP)
VPC
M
VPC security group attached to RDS instance permits ingress from '0.0.0.0/0' to all ports
VPC
M
VPC security group inbound rule allows ingress from '0.0.0.0/0' to all ports and protocols
VPC
M
VPC security group inbound rule permits ingress from a public address to all ports and protocols
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 11214 (Memcached SSL)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 11215 (Memcached SSL)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 135 (MSSQL Debugger)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 137 (NetBIOS Name Service)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 138 (NetBios Datagram Service)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 139 (NetBios Session Service)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 1433 (MSSQL Server)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 1434 (MSSQL Admin)
VPC
Next