A vulnerability in AWS Trusted Advisor allowed attackers to bypass checks for unprotected S3 buckets, misleading users about their security status. AWS has since addressed the issue and advised customers to review their S3 bucket permissions to align with security best practices.
The tool analyzes IAM Role trust policies and S3 bucket policies in AWS accounts to identify third-party vendor access. It uses a reference list of known AWS accounts to highlight potential vulnerabilities, such as IAM roles lacking the ExternalId condition, and generates a detailed markdown report of the findings. Users can customize trusted accounts to differentiate between internal and external access.