01Automated scanning of IAM authorization details via boto3
02Mapping of principal-to-policy relationships to visualize attack vectors
03Audit of wildcard resource (*) policies for dangerous actions
044,120 GitHub stars
05Detection of high-risk permission combinations (e.g., iam:PassRole, iam:CreatePolicyVersion)
06Prioritized reporting with severity scores and remediation recommendations