aws-security-mcp 0.2.0 → 0.3.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,16 +1,16 @@
1
1
  {
2
2
  "lastScan": {
3
- "scanStart": "2026-04-10T11:34:36.304Z",
4
- "scanEnd": "2026-04-10T11:35:00.159Z",
3
+ "scanStart": "2026-04-10T15:35:01.552Z",
4
+ "scanEnd": "2026-04-10T15:35:25.816Z",
5
5
  "region": "cn-north-1",
6
6
  "accountId": "468254682119",
7
7
  "summary": {
8
- "totalFindings": 50,
9
- "critical": 2,
8
+ "totalFindings": 48,
9
+ "critical": 0,
10
10
  "high": 3,
11
11
  "medium": 13,
12
12
  "low": 32,
13
- "modulesSuccess": 7,
13
+ "modulesSuccess": 8,
14
14
  "modulesError": 0
15
15
  },
16
16
  "modules": [
@@ -26,7 +26,7 @@
26
26
  },
27
27
  {
28
28
  "module": "iam",
29
- "findingsCount": 3,
29
+ "findingsCount": 1,
30
30
  "status": "success"
31
31
  },
32
32
  {
@@ -48,6 +48,11 @@
48
48
  "module": "vpc",
49
49
  "findingsCount": 0,
50
50
  "status": "success"
51
+ },
52
+ {
53
+ "module": "service_detection",
54
+ "findingsCount": 0,
55
+ "status": "success"
51
56
  }
52
57
  ],
53
58
  "findings": [
@@ -611,41 +616,6 @@
611
616
  "priority": "P3",
612
617
  "module": "s3"
613
618
  },
614
- {
615
- "riskScore": 10,
616
- "title": "Root account does not have MFA enabled",
617
- "resourceType": "AWS::IAM::Root",
618
- "resourceId": "root",
619
- "resourceArn": "arn:aws-cn:iam::468254682119:root",
620
- "region": "global",
621
- "description": "The AWS root account does not have multi-factor authentication enabled.",
622
- "impact": "Compromised root credentials would grant unrestricted access to all AWS resources with no second factor of authentication.",
623
- "remediationSteps": [
624
- "Enable MFA on the root account immediately using a hardware or virtual MFA device.",
625
- "Store the MFA device in a secure location.",
626
- "Avoid using the root account for daily operations."
627
- ],
628
- "severity": "CRITICAL",
629
- "priority": "P0",
630
- "module": "iam"
631
- },
632
- {
633
- "riskScore": 9.5,
634
- "title": "Root account has active access keys",
635
- "resourceType": "AWS::IAM::Root",
636
- "resourceId": "root",
637
- "resourceArn": "arn:aws-cn:iam::468254682119:root",
638
- "region": "global",
639
- "description": "The root account has one or more active access keys.",
640
- "impact": "Access keys for the root account provide unrestricted API access. If leaked, the entire account is compromised.",
641
- "remediationSteps": [
642
- "Delete all root account access keys.",
643
- "Use IAM users or roles with least-privilege policies instead."
644
- ],
645
- "severity": "CRITICAL",
646
- "priority": "P0",
647
- "module": "iam"
648
- },
649
619
  {
650
620
  "riskScore": 7.5,
651
621
  "title": "IAM user hzhaoam has access key older than 90 days",
@@ -653,7 +623,7 @@
653
623
  "resourceId": "AKIAW2BRHNQD6OGWH6VQ",
654
624
  "resourceArn": "arn:aws-cn:iam::468254682119:user/hzhaoam",
655
625
  "region": "global",
656
- "description": "Access key AKIAW2BRHNQD6OGWH6VQ for user \"hzhaoam\" is 1799 days old.",
626
+ "description": "Access key AKIAW2BRHNQD6OGWH6VQ for user \"hzhaoam\" is 1800 days old.",
657
627
  "impact": "Old access keys are more likely to have been exposed or leaked over time.",
658
628
  "remediationSteps": [
659
629
  "Rotate the access key by creating a new key and deleting the old one.",
@@ -910,16 +880,16 @@
910
880
  "history": [
911
881
  {
912
882
  "date": "2026-04-10",
913
- "score": 13,
914
- "critical": 2,
883
+ "score": 43,
884
+ "critical": 0,
915
885
  "high": 3,
916
886
  "medium": 13,
917
887
  "low": 32,
918
- "totalFindings": 50
888
+ "totalFindings": 48
919
889
  }
920
890
  ],
921
891
  "meta": {
922
- "generatedAt": "2026-04-10T11:35:00.161Z",
892
+ "generatedAt": "2026-04-10T15:35:25.822Z",
923
893
  "version": "1.0.0",
924
894
  "dataRetentionDays": 30
925
895
  }