Skip to content

Commit 53f4af0

Browse files
committed
v0.0.4
1 parent 47c8292 commit 53f4af0

File tree

3 files changed

+45
-10
lines changed

3 files changed

+45
-10
lines changed

README.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -78,6 +78,10 @@ Run `./rpCheckup` and view the generated report found in `output/`.
7878
rpCheckup uses [goldfiglabs/introspector](https://github.com/goldfiglabs/introspector) to snapshot the configuration of your AWS account. rpCheckup runs SQL queries to generate findings based on this snapshot. Introspector does the heavy lifting of importing and normalizing the configurations while rpCheckup is responsible for querying and report generation.
7979

8080
## Notes
81+
If the account you are scanning is not the master account in an Organization, other
82+
accounts in the Organization may be detected as external accounts. This is because
83+
non-master accounts may not have access to see the organization structure.
84+
8185
Since rpCheckup relies on Introspector's snapshots, rpCheckup is unable to detect policies that are no longer attached. When detecting flapping or transient access, please use tools which utilize audit and security logs (CloudTrail, etc). See [here][2] for further information in preventing resource exposure.
8286

8387
TODO: Add example runs against Endgame Terraform'd account.

build.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ mkdir -p $DIR/dist
1010
cd $DIR
1111

1212
# Pre-req: go get github.com/markbates/pkger/cmd/pkger
13-
GOBIN="${GOPATH:-~/go}"
13+
GOBIN="${GOPATH:-${HOME}/go}"
1414
$GOBIN/bin/pkger
1515

1616
GOOS=darwin GOARCH=amd64 go build -o dist/rpCheckup_darwin_amd64

templates/resource_policies.gohtml

Lines changed: 40 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -14,15 +14,15 @@
1414
}
1515

1616
.report table {
17-
font-size: 12px;
17+
font-size: 16px;
1818
border-spacing: 0;
1919
margin: auto;
2020
}
2121

2222
.report td,
2323
.report th {
2424
border: 1px solid #888;
25-
padding: 4px 16px;
25+
padding: 4px 10px;
2626
text-align: center;
2727
}
2828

@@ -74,6 +74,20 @@
7474
.metadata {
7575
font-weight: bold;
7676
}
77+
78+
.links {
79+
display: flex;
80+
flex-direction: column;
81+
justify-content: center;
82+
}
83+
84+
.notes li {
85+
padding: 4px;
86+
}
87+
88+
.notes h4 {
89+
text-align: center;
90+
}
7791
</style>
7892
</head>
7993
<body>
@@ -124,19 +138,36 @@
124138
{{end}}
125139
</tbody>
126140
</table>
127-
141+
128142
&mdash;
129143

130144
<div class="two_columns" style="width:100%">
131-
<section>
132-
<a href="https://github.com/goldfiglabs/rpCheckup">goldfiglabs/rpCheckup</a> v0.0.2
145+
<section class="notes">
146+
<h4>Notes</h4>
147+
<ol>
148+
<li>
149+
This report ignores resources that can, but currently don't, have resource
150+
policies. That means many resources that are created and managed only by
151+
IAM policies will not show up here. This report is intended to cover only the
152+
places where a resource policy has been put in place.
153+
</li>
154+
<li>
155+
If the account you are scanning is not the master account in an
156+
Organization, other accounts in the Organization may be detected as
157+
external accounts. This is because non-master accounts may not have
158+
access to see the organization structure.
159+
</li>
160+
</ol>
133161
</section>
134-
<section>
135-
<a href="https://www.goldfiglabs.com/?utm_source=opensource&utm_medium=rpcheckup&utm_campaign=report">Gold Fig Labs</a>
162+
<section class="links">
163+
<p>
164+
<a target="_blank" href="https://github.com/goldfiglabs/rpCheckup">goldfiglabs/rpCheckup</a> v0.0.4
165+
</p>
166+
<p>
167+
Made by <a target="_blank" href="https://www.goldfiglabs.com/">Gold Fig Labs</a>
168+
</p>
136169
</section>
137170
</div>
138-
139-
140171
</main>
141172
</body>
142173
</html>

0 commit comments

Comments
 (0)