Releases: salesforce/cloudsplaining
Releases · salesforce/cloudsplaining
0.1.5: Make Cloudsplaining callable via script for AWS Lambda function usage
- Made callable via script to partially fix #39
- Move to virtualenv instead of Pipenv
0.1.4: Inline policies are now clearly mapped to their roles
Merge pull request #51 from kmcquade/fix/GH-47-clarify-tab-description Report description improvements to address #47. Version 0.1.4 bump
0.1.3: New UI Capabilities - Row checkbox selection and Excel/CSV export
- Excel/CSV export capability
- Table row selection capability
0.1.2: Improved Summary Tables - filter columns, cell vertical length restrictions
Merge pull request #43 from kmcquade/fix/table-selections UI improvements to the Summary Tables. Much more readable when there are a lot of results.
0.1.1: Bugfix for risk count in IAM Principals tab; Attached to Principals dropdown included for managed policies
- Bugfix: issue where "Data Exfiltration" count was showing up in the "Resource Exposure" count column in the IAM Principals tab
- Added "Attached to Principals" dropdown card for Customer-Managed and AWS-Managed Policies
0.1.0: Exclusions fixes, IAM Principals tab enhancements, UI Improvements
- Exclusions fixes: Fixed issue where exclusions file was including dangling policies in the results (Fixes #33)
- Changed IAM Principals table so that the principals can be sorted according to their risks. This will really help with pentesting
- Other UI Improvements
0.0.14: Fixed issue where Data Exposure tallies were missing in AWS Managed Table
- Fixed issue where Data Exposure tallies were missing in AWS Managed Table
0.0.13: Windows compatibility
Merge pull request #31 from kmcquade/fix/GH-30-windows-compatibility Windows compability fix. 0.0.13 bump
0.0.12: Various UI Improvements; Fixes issue where expanded_actions is empty
Version 0.0.12 bump
0.0.11: Fixes crash arising from policies with "Deny" and no resource constraints
Merge pull request #24 from kmcquade/fix/GH-23-bool-object-not-iterable Fixes #23 - issue arising from policies with "Deny" with no resource constraints