Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All service groups
AWS
Azure
Google
All Google service groups
App Engine
Artifact Registry
BigQuery
Cloud DNS
Cloud Functions
Cloud KMS
Cloud Platform
Cloud SQL
Cloud Storage
Compute Engine
Compute
Container
Dataflow
Dataproc
Filestore
IAM
Kubernetes (Container) Engine
Monitor
Network
Redis
Secrets Manager
Storage
Kubernetes
Report a new vulnerability
RULE
SERVICE GROUP
H
IAM access key generated for `root` user
IAM
H
IAM policy allows privilege escalation
IAM
H
IAM policy grants full administrative rights
IAM
H
IAM policy has a statement block with a wildcard action
IAM
H
IAM role can be assumed by anyone in the account or anyone in any account
IAM
H
Service account has admin privileges
IAM
H
The IAM role can be assumed by any service or principal
IAM
M
A support role has not been created to manage incidents with AWS Support
IAM
M
AWS IAM access key hasn't been used for at least 90 days
IAM
M
AWS IAM user password hasn't been used for at least 90 days
IAM
M
Broad IAM permissions in IAM policy
IAM
M
IAM default audit log config does not include 'DATA_READ' and 'DATA_WRITE' log types
IAM
M
IAM Delegated admin is misconfigured
IAM
M
IAM password policy does not expire passwords within 90 days
IAM
M
IAM password policy does not prevent reuse of previously used passwords
IAM
M
IAM password policy does not prevent reuse of the four previously used passwords
IAM
M
IAM password policy does not require at least one lowercase letter
IAM
M
IAM password policy does not require at least one number
IAM
M
IAM password policy does not require at least one symbol
IAM
M
IAM password policy does not require at least one uppercase letter
IAM
M
IAM password policy does not require minimum password length of 7 or does not include alphanumeric characters
IAM
M
IAM password policy minimum password length is too short
IAM
M
IAM permission assigned to user
IAM
M
IAM policy is attached to user
IAM
M
IAM principal has no permissions boundary
IAM
M
IAM principal has overly permissive permissions boundary
IAM
M
IAM role used for trust relationship does not have MFA or external IDs
IAM
M
IAM user does not have MFA (virtual or hardware) enabled
IAM
M
IAM user has privileged roles at project level
IAM
M
IAM user is not a member of at least one group
IAM
Next