Skip to main content

Overview

The Cloud Scanner identifies misconfigurations and vulnerabilities in cloud environments, focusing on AWS S3 buckets and Google Cloud Storage. It detects public access issues, overly permissive configurations, and interesting files that may expose sensitive data. The Cloud Scanner is a vulnerability scanner: it actively tests cloud resources for security weaknesses. It does not add data to your Attack Surface. Identified vulnerabilities are reported as findings.

Supported targets

Target typeExamples
IP address192.168.1.1
Hostnameexample.com, mybucket.s3.amazonaws.com
URLhttps://mybucket.s3.amazonaws.com, https://storage.googleapis.com/mybucket

Cloud storage URLs

You can scan cloud storage buckets directly using their URLs:
ProviderURL format
AWS S3https://<bucket_name>.s3.amazonaws.com
Google Cloud Storagehttps://storage.googleapis.com/<bucket_name>

Supported cloud providers

ProviderDetectionVulnerability scanning
AWS✅ S3 bucket misconfigurations
Google Cloud✅ Cloud Storage misconfigurations
AzureComing soon

Scan options

The Cloud Scanner has two configurable options (both enabled by default):
OptionDescription
Detect cloud providerIdentifies which cloud provider hosts the target by checking IP ranges
Detect cloud vulnerabilitiesScans for misconfigurations and security issues
If “Detect cloud provider” is disabled, the scanner tests for vulnerabilities across all supported providers. If enabled, it only tests for issues specific to the detected provider.

What it detects

AWS S3

CheckDescription
Public bucket listingBucket contents can be enumerated
Public read accessObjects can be read without authentication
Public write accessObjects can be uploaded or modified
ACL misconfigurationsOverly permissive access control lists
Interesting filesSensitive files like wp-config, backups, keys

Google Cloud Storage

CheckDescription
Public bucket accessBucket accessible without authentication
IAM policy issuesallUsers or allAuthenticatedUsers permissions
Bucket ACLOverly permissive access control
Uniform access not enabledLegacy ACL mode in use
Logging not enabledAccess logging disabled
Versioning/retention not enabledNo protection against accidental deletion
Encryption not configuredUsing default encryption only
Lifecycle rules missingNo automated object management
Interesting filesSensitive files exposed in the bucket

How it works

The Cloud Scanner performs these steps:
  1. Target resolution: Resolves the target to an IP address
  2. Provider detection: Checks IP ranges to identify AWS, GCP, or Azure
  3. Bucket discovery: Identifies storage buckets from the target
  4. Permission testing: Tests what operations are allowed (read, write, list)
  5. Configuration analysis: Checks security settings like ACLs, IAM policies, encryption
  6. Interesting file search: Looks for sensitive filenames in accessible buckets

Follow-up actions

After discovering cloud misconfigurations:
  • Restrict public access: Remove allUsers and allAuthenticatedUsers permissions
  • Enable bucket-level security: Use uniform bucket-level access (GCP) or block public access (AWS)
  • Enable logging: Track access to sensitive buckets
  • Review sensitive files: Check if exposed files contain credentials or PII
  • Run Network Scanner: Test the underlying infrastructure
  • Run Subdomain Finder: Discover additional cloud-hosted assets