Name | Modified | Size | Downloads / Week |
---|---|---|---|
Parent folder | |||
Prowler 5.10.0 source code.tar.gz | 2025-08-07 | 52.6 MB | |
Prowler 5.10.0 source code.zip | 2025-08-07 | 57.2 MB | |
README.md | 2025-08-07 | 9.8 kB | |
Totals: 3 Items | 109.8 MB | 0 |
šļø Amazon S3 Integration
We're excited to introduce seamless integration with Amazon S3, giving you full control over where your scan reports are delivered. With this new feature, automatically send scan reports to any configured S3 bucket.
- Fully customizable: Configure one or multiple S3 buckets as destinations for scan reports, with no restrictions on provider or bucket combinations.
- Streamlined workflows: Integrate report delivery into existing data pipelines and storage strategies without limitation.
- No boundaries: There are no constraints tying specific providers to specific buckets, offering maximum flexibility for multi-cloud and hybrid environments.
Start leveraging the power of Amazon S3 integration today and make report management simpler and more adaptable than ever before.
š GitHub Provider
Prowler App now supports GitHub as cloud provider, enabling you to assess the security posture of your GitHub organization and repositories with ease.
- Analyze GitHub configuration and permissions to identify security gaps.
- Detect common misconfigurations and potential risks across your repositories.
- Authenticate using Personal Access Tokens, OAuth App Tokens, or GitHub Apps, depending on your organizationās setup.
This integration brings GitHub into the same powerful security framework you already use with AWS, Azure, and other providersāhelping you stay secure across all your environments.
Start scanning your GitHub environment today to gain full visibility and actionable insights.
Scopped Scannings - CLI-Only
Weāve added support forĀ repository and organization scopingĀ in the GitHub provider to enable more targeted security assessments.
Instead of scanningĀ allĀ accessible repositories and organizations, you can now define exactly what to scan using two new CLI flags:
--repository
Ā ā Specify one or more repositories to scan, e.g.:--repository acme/app acme/lib
--organization
Ā ā Limit scans to specific organizations, e.g.:--organization acme-org other-org
These can also be combined to narrow the scope even further. This update makes it easier to audit specific parts of your GitHub footprintāparticularly useful for large organizations or multi-team environments.
[!NOTE] This will be available in the Prowler App in upcoming versions, along with full support for the corresponding CLI arguments.
š¦ Lighthouse Improvements: Enhanced Insights + New Banner
We've made several improvements to Lighthouse:
- Resolved multiple issues for smoother performance and more accurate results.
- Lighthouse is now featured directly on the Overview dashboard.
ā New Checks
Weāve introduced 5 new security checks to enhance your Cloud posture.
AWS
bedrock_api_key_no_administrative_privileges
ā Ensures Bedrock API keys donāt have excessive permissions.bedrock_api_key_no_long_term_credentials
ā Detects long-lived credentials in Bedrock API keys.s3_bucket_shadow_resource_vulnerability
ā Flags shadow resources in S3 buckets that may introduce risk.
Azure
vm_desired_sku_size
ā Validates that VMs are configured with the desired SKU size.vm_scaleset_not_empty
ā Ensures VM Scale Sets are not empty, reducing configuration drift.
š Compliance Update
Prowler now supports theĀ CIS Microsoft Azure Foundations Benchmark v4.0, bringing your compliance checks in line with the latest industry best practices for securing Azure environments.
UI
š Added
- Lighthouse banner (#8259)
- Amazon AWS S3 integration (#8391)
- Github provider support (#8405)
- XML validation for SAML metadata in the UI (#8429)
- Default Mutelist placeholder in the UI (#8455)
- Help link in the SAML configuration modal (#8461)
š Changed
- Rename
Memberships
toOrganization
in the sidebar (#8415)
š Fixed
- Display error messages and allow editing last message in Lighthouse (#8358)
ā Removed
- Removed
Browse all resources
from the sidebar, sidebar now shows a singleResources
entry (#8418) - Removed
Misconfigurations
from theTop Failed Findings
section in the sidebar (#8426)
API
š Added
- Github provider support (#8271)
- Integration with Amazon S3, enabling storage and retrieval of scan data via S3 buckets (#8056)
š Fixed
- Avoid sending errors to Sentry in M365 provider when user authentication fails (#8420)
SDK
š Added
bedrock_api_key_no_administrative_privileges
check for AWS provider (#8321)bedrock_api_key_no_long_term_credentials
check for AWS provider (#8396)- Support App Key Content in GitHub provider (#8271)
- CIS 4.0 for the Azure provider (#7782)
vm_desired_sku_size
check for Azure provider (#8191)vm_scaleset_not_empty
check for Azure provider (#8192)- GitHub repository and organization scoping support with
--repository/respositories
and--organization/organizations
flags (#8329) - GCP provider retry configuration (#8412)
s3_bucket_shadow_resource_vulnerability
check for AWS provider (#8398)
š Changed
- Handle some AWS errors as warnings instead of errors (#8347)
- Revert import of
checkov
python library (#8385) - Updated policy mapping in ISMS-P compliance file for improved alignment (#8367)
š Fixed
- False positives in SQS encryption check for ephemeral queues (#8330)
- Add protocol validation check in security group checks to ensure proper protocol matching (#8374)
- Add missing audit evidence for controls 1.1.4 and 2.5.5 for ISMS-P compliance. (#8386)
- Use the correct @staticmethod decorator for
set_identity
andset_session_config
methods in AwsProvider (#8056) - Use the correct default value for
role_session_name
andsession_duration
in AwsSetUpSession (#8056) - Use the correct default value for
role_session_name
andsession_duration
in S3 (#8417) - GitHub App authentication fails to generate output files and HTML header sections (#8423)
- S3
test_connection
uses AWS S3 APIHeadBucket
instead ofGetBucketLocation
(#8456) - Add more validations to Azure Storage models when some values are None to avoid serialization issues (#8325)
sns_topics_not_publicly_accessible
false positive withaws:SourceArn
conditions (#8326)- Remove typo from description req 1.2.3 - Prowler ThreatScore m365 (#8384)
- Way of counting FAILED/PASS reqs from
kisa_isms_p_2023_aws
table (#8382) - Use default tenant domain instead of first domain in list for Azure and M365 providers (#8402)
- Avoid multiple module error calls in M365 provider (#8353)
- Avoid sending errors to Sentry in M365 provider when user authentication fails (#8420)
- Tweaks from Prowler ThreatScore in order to handle the correct reqs (#8401)
- Make
setup_assumed_session
static for the AWS provider (#8419)