From 7e8bb99f162927e8f581b0fb56832afc7cfa9f2f Mon Sep 17 00:00:00 2001 From: Mariusz B Date: Wed, 15 Apr 2020 12:33:57 +0200 Subject: [PATCH 1/2] Update find-exposed-resources.sh --- clouds/aws/find-exposed-resources.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/clouds/aws/find-exposed-resources.sh b/clouds/aws/find-exposed-resources.sh index f92a90b..beeee31 100755 --- a/clouds/aws/find-exposed-resources.sh +++ b/clouds/aws/find-exposed-resources.sh @@ -58,7 +58,7 @@ function rds_snapshots() { function ami_images() { out=$(_aws ec2 describe-images --owners self --executable-users all) if ! echo "$out" | grep -q '": \[\]'; then - echo "---[ Public RDS Snapshots" + echo "---[ Public AMI Images" echo "$out" echo fi From a0c44ef0bebc4c83823180a1e25f6cd92a07879d Mon Sep 17 00:00:00 2001 From: Mariusz B Date: Wed, 15 Apr 2020 12:40:42 +0200 Subject: [PATCH 2/2] Update evaluate-iam-role.sh --- clouds/aws/evaluate-iam-role.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/clouds/aws/evaluate-iam-role.sh b/clouds/aws/evaluate-iam-role.sh index 817d08c..b2c28ad 100755 --- a/clouds/aws/evaluate-iam-role.sh +++ b/clouds/aws/evaluate-iam-role.sh @@ -184,7 +184,7 @@ if [[ "$ROLE_NAME" == "all" ]]; then echo "[+] Evaluating ALL used IAM Roles" echo - out=($(aws --profile awl iam list-roles --query 'Roles[*].RoleName' --output text | tr '\t' '\n')) + out=($(aws --profile $PROFILE iam list-roles --query 'Roles[*].RoleName' --output text | tr '\t' '\n')) for role in "${out[@]}"; do examine_role $role