Skip to content

MegaZegan/CloudPolicyLens

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CloudPolicyLens

CloudPolicyLens is a defensive cloud security project for reviewing IAM-style JSON policies. It flags risky permissions, explains why they matter, and gives remediation guidance that is practical for security reviews and pull requests.

What It Detects

  • Full administrative access through Action: "*" or wildcard services.
  • Wildcard resources on sensitive actions.
  • Public or external principals in allow statements.
  • iam:PassRole without tight resource and service constraints.
  • Sensitive identity actions without MFA conditions.
  • Allow statements using NotAction, which can be dangerously broad.

Demo

python -m venv .venv
.\.venv\Scripts\Activate.ps1
pip install -e . pytest
cloudpolicylens scan samples\risky-policy.json
pytest

Example

cloudpolicylens scan samples\risky-policy.json --json

This prints machine-readable findings that can be attached to CI or a pull request review.

Interview Talking Points

  • Cloud security reviews need explainability, not just pass/fail checks.
  • The analyzer treats each statement independently so reviewers can point to exact policy locations.
  • Rules are deterministic and easy to extend for organization-specific guardrails.
  • This is safe defensive tooling: it analyzes local JSON files only.

About

IAM-style cloud policy linter for risky permissions, public principals, and weak security guardrails.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages