Skip to content

ppiankov/iamspectre

Repository files navigation

iamspectre

CI Go Report Card ANCC

iamspectre — Cross-cloud IAM auditor for AWS, GCP, and Azure AD. Part of SpectreHub.

What it is

  • Scans IAM resources across AWS, GCP, and Azure AD
  • Detects stale users, unused roles, wildcard policies, missing MFA, and expired secrets
  • Checks credential reports, key ages, service account bindings, and directory roles
  • Each finding includes severity and actionable recommendation
  • Outputs text, JSON, SARIF, and SpectreHub formats

What it is NOT

  • Not a remediation tool — reports only, never modifies IAM resources
  • Not a real-time monitor — point-in-time scanner
  • Not a cost estimator — IAM findings are security risks, not dollar waste
  • Not a CSPM replacement — focuses on identity and access only

Quick start

Homebrew

brew tap ppiankov/tap
brew install iamspectre

From source

git clone https://github.com/ppiankov/iamspectre.git
cd iamspectre
make build

Usage

iamspectre scan --provider aws --format json

CLI commands

Command Description
iamspectre scan Scan IAM resources across cloud providers
iamspectre init Generate config file and IAM permissions
iamspectre version Print version

SpectreHub integration

iamspectre feeds IAM hygiene findings into SpectreHub for unified visibility across your infrastructure.

spectrehub collect --tool iamspectre

Safety

iamspectre operates in read-only mode. It inspects and reports — never modifies, deletes, or alters your IAM resources.

Documentation

Document Contents
CLI Reference Full command reference, flags, and configuration

License

MIT — see LICENSE.


Built by Obsta Labs

About

Cross-cloud IAM auditor — finds unused, over-permissioned, and stale identities across AWS and GCP

Topics

Resources

License

Contributing

Security policy

Stars

Watchers

Forks

Packages

 
 
 

Contributors

Languages