The tool analyzes IAM Role trust policies and S3 bucket policies in AWS accounts to identify third-party vendor access. It uses a reference list of known AWS accounts to highlight potential vulnerabilities, such as IAM roles lacking the ExternalId condition, and generates a detailed markdown report of the findings. Users can customize trusted accounts to differentiate between internal and external access.