SkillAgentSearch skills...

AWSLeakBuster

πŸ” Scans AWS accounts for potentially sensitive data leaks (SSM parameters, Lambda env vars, Secrets Manager, EC2 UserData, etc.). Not a professional developer – feel free to contribute!

Install / Use

/learn @kultgestalt666/AWSLeakBuster
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

AWSLeakBuster

AWSLeakBuster is a command-line tool for scanning AWS accounts for potentially sensitive data that is often overlooked or unintentionally exposed.

It focuses on identifying risky content in:

  • AWS Systems Manager Parameter Store (SSM)
  • AWS Secrets Manager
  • Lambda environment variables and function code
  • EC2 User Data
  • (More coming soon...)

πŸ” Purpose

AWSLeakBuster helps penetration testers, auditors, and cloud engineers spot misconfigurations and secrets left in AWS services that may expose sensitive data.
It uses the AWS CLI configuration (~/.aws/credentials) to connect via named profiles.

βš™οΈ Features

  • Modular architecture (easy to extend)
  • CLI with selective scan options
  • Designed for offline/whitebox use
  • Simple text output (machine-readable export planned)

πŸš€ Usage

python cli.py --profile <aws-profile> --scan ssm-parameters

Scan multiple sources at once:

python cli.py --profile <aws-profile> --scan ssm-parameters ec2

πŸ“¦ Installation

  1. Clone the repository:

    git clone https://github.com/kultgestalt666/AWSLeakBuster.git
    cd AWSLeakBuster
    
  2. Install dependencies:

    pip install -r requirements.txt
    

πŸ“¦ Supported Scan Modules

| Module | Description | |-------------------|----------------------------------------------------------------------------| | ssm-parameters | Scan SSM Parameters for sensitive or exposed values | | ssm-documents | Analyze SSM Documents for insecure automation or hardcoded credentials | | secrets | Extract readable secrets from Secrets Manager | | ec2 | Read EC2 UserData scripts for embedded secrets | | lambda-env | Dump Lambda environment variables | | lambda-code | Download Lambda function code archives | | s3 | Check bucket public access, write access, and cleartext settings | | ecs | Inspect ECS tasks for environment secrets, exec access, and logging | | beanstalk | Read Elastic Beanstalk environment variables | | snapshots | Identify publicly exposed EBS and RDS snapshots | | cloudformation | Dump visible parameters and stack outputs in CloudFormation stacks | | glue-env | Extract Glue job settings and linked secrets | | glue-code | Download Glue job scripts from S3 | | codebuild | Analyze CodeBuild projects for privilege escalation and secrets | | cognito | List Cognito Identity Pools with unauthenticated access enabled | | sqs | Analyze SQS queue policies and optionally dump readable messages | | sns | Review SNS topic access and subscription exposure | | apigateway | Check API Gateway stages for public exposure | | eventbridge | List EventBridge rules and targets for leak potential | | cloudwatch-logs | Dump CloudWatch Logs, skipping VPC Flow Logs |

πŸ§ͺ Project Status

This is a personal project in early development.
Basic modules work, more are in progress. Functionality and stability will improve over time.

πŸ™‹β€β™‚οΈ Disclaimer

I'm not a professional developer – just someone who enjoys breaking cloud things in a responsible way.

This tool is built for fun and learning. I can’t guarantee it works perfectly in all environments or provide deep support for special edge cases.
Use at your own risk. Pull requests and feedback are welcome.

πŸ“„ License

MIT License – free to use, modify, and share.

View on GitHub
GitHub Stars8
CategoryDevelopment
Updated4mo ago
Forks0

Languages

Python

Security Score

82/100

Audited on Nov 12, 2025

No findings