Skip to content

Commit

Permalink
evaluate-iam-role: support for wildcarded permissions
Browse files Browse the repository at this point in the history
  • Loading branch information
mgeeky committed Dec 3, 2019
1 parent e3fc9a5 commit 4ffdcef
Showing 1 changed file with 5 additions and 1 deletion.
6 changes: 5 additions & 1 deletion clouds/aws/evaluate-iam-role.sh
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,7 @@ PROFILE=$1
ROLE_NAME=$2

known_dangerous_permissions=(
"*:*"
"iam:CreatePolicyVersion"
"iam:SetDefaultPolicyVersion"
"iam:PassRole"
Expand Down Expand Up @@ -63,6 +64,8 @@ for policy in "${attached_role_policies[@]}" ; do
for dangperm in "${known_dangerous_permissions[@]}"; do
if echo "$dangperm" | grep -iq $perm ; then
dangerous_permissions+=("$perm")
elif echo "$perm" | grep -qP "\w+:\*"; then
dangerous_permissions+=("$perm")
fi
done
done
Expand All @@ -71,7 +74,8 @@ done

if [[ ${#dangerous_permissions[@]} -gt 0 ]]; then
echo -e "\n\n=============== Detected dangerous permissions granted ==============="
for dangperm in "${dangerous_permissions[@]}"; do
sorted=($(echo "${dangerous_permissions[@]}" | tr ' ' '\n' | sort -u ))
for dangperm in "${sorted[@]}"; do
echo -e "\t$dangperm"
done
else
Expand Down

0 comments on commit 4ffdcef

Please sign in to comment.