01Generates detailed audit reports on access management
02884 GitHub stars
03Reviews Network Access Control Lists (ACLs) for vulnerabilities
04Evaluates compliance with security best practices
05Analyzes IAM policies for overly broad permissions
06Identifies potential privilege escalation paths