Wildcards
Detects Action:* and risky Resource:* combinations.
Static security scanner for Terraform IAM policies. Catch over-permissioned roles, wildcards, and escalation paths before they merge.
CLI available today. Hosted GitHub App is not yet public.
IAM Armor analyzes Terraform IAM resources and flags risky permission patterns with deterministic, explainable rules.
Detects Action:* and risky Resource:* combinations.
Flags broad iam:PassRole and administrator policy attachments.
Catches wildcard or ambiguous principals in assume role flows.
Identifies anti-patterns like NotAction/NotResource usage.
pip install iamarmor
iamarmor scan . Also supported: pipx install iamarmor and uvx iamarmor scan .
- name: Scan IAM policies
run: |
pip install iamarmor
iamarmor scan . --fail-on high Use this in pull request workflows to block merges on high-risk IAM findings.
repos:
- repo: https://github.com/iam-armor/iamarmor
rev: v0.2.0
hooks:
- id: iamarmor Add to .pre-commit-config.yaml to catch IAM findings on every commit.
Yes. The scanner is open source under the MIT license at github.com/iam-armor/iamarmor.
No. It statically analyzes Terraform source and runs offline.
Yes. Install via pip, run iamarmor scan, and gate merges with --fail-on.
Not yet. The OSS CLI is available today; the hosted app is planned separately.