Hacker Timesnew | past | comments | ask | show | jobs | submitlogin

> the tool can discover incorrect configurations that would allow someone who extracted the key to change permissions of the bucket.

Nit: The tool can discover and abuse excessive permissions.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: