User mentions building a workflow to automate checks for security vulnerabilities in cloud environments, suggesting a need for automated tools to identify issues like 'Shadow' Admin roles and hardcoded API keys.
Most people think hackers use complex zero-days. In reality, it's almost always "low-hanging fruit" that devs miss during fast sprints. 1. **The "Shadow" Admin:** A dev creates a temporary IAM role for a quick fix, gives it full Admin access, and forgets to delete it. 6 months later, those keys are still active. 2. **Secrets in Plain Sight:** Hardcoded API keys in a `.env` file or a config file that accidentally got pushed to a non-production branch. 3. **The Public Bucket "Oops":** An S3 bucket that was meant for assets but contains one sensitive JSON file with public read access. We’ve been building a workflow to automate these checks (both in the code and the cloud config) because manual reviews are just too slow. **I’ve put together a 10-point 'Pre-Production' checklist for this. If anyone wants it for their team, let me know and I'll send it over.**