fix(deps): update toniblyx/prowler docker tag to v5.25.3#76
Open
renovate[bot] wants to merge 1 commit intodevfrom
Open
fix(deps): update toniblyx/prowler docker tag to v5.25.3#76renovate[bot] wants to merge 1 commit intodevfrom
renovate[bot] wants to merge 1 commit intodevfrom
Conversation
Contributor
Author
Branch automerge failureThis PR was configured for branch automerge. However, this is not possible, so it has been raised as a PR instead.
|
8238903 to
37bfb6d
Compare
37bfb6d to
ce2f27e
Compare
d2a4abc to
f06c9ed
Compare
0558c00 to
ff99ee4
Compare
fa775f0 to
1967a23
Compare
da539fb to
2b69680
Compare
91269de to
48c03c7
Compare
59c0042 to
432cab4
Compare
9dc50c7 to
da11635
Compare
8ac9a46 to
3b37972
Compare
cd60360 to
d72cb90
Compare
d72cb90 to
aa3f405
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
5.2.0→5.25.3Release Notes
prowler-cloud/prowler (toniblyx/prowler)
v5.25.3: Prowler 5.25.3Compare Source
UI
🐞 Fixed
1(#11059)SDK
🐞 Fixed
v5.25.2: Prowler 5.25.2Compare Source
UI
🔄 Changed
SDK
🐞 Fixed
route53_dangling_ip_subdomain_takeovernow also flagsCNAMErecords pointing to S3 website endpoints whose buckets are missing from the account (#10920)apiGroup(#10969)userIdentityevents (#10986)v5.25.1: Prowler 5.25.1Compare Source
UI
🐞 Fixed
API
🐞 Fixed
scheduledstate are now cleaned up after the stale threshold (#10917)SDK
🐞 Fixed
KeyErrorwhen generating compliance outputs after the CLI scan #10919provider_uidnow uses the cluster name in in-cluster mode (so--cluster-nameis correctly reflected in findings) and keeps the kubeconfig context in kubeconfig mode (#10483)v5.25.0: Prowler 5.25.0Compare Source
✨ New features to highlight
Enjoy them all now for free at https://cloud.prowler.com/
📦 Official Prowler GitHub Action
prowler-cloud/prowler@5.25is now an official GitHub Action. Drop it into any workflow to run a Prowler scan, optionally upload SARIF to GitHub Code Scanning, and push results to Prowler Cloud.The action is pinned to the matching release tag, so v5.25 ships with
prowler-cloud/prowler@5.25ready to use.🐙 GitHub — zizmor Workflow Scanning as a First-Class Service
The GitHub provider gains a new service: GitHub Actions, powered by zizmor for static analysis of workflow files. Prowler now scans
.github/workflows/*.ymlfor the OWASP Top 10 CI/CD risks — script injection, overly permissiveGITHUB_TOKEN, untrusted checkouts, dangerous triggers — and ships the findings through the same pipeline as every other GitHub check. This is your first line of defense against supply chain attacks: a poisoned action, a compromised tag, or a workflow that leaks secrets to a forked PR is exactly the kind of footgunzizmorcatches before it ships.zizmorv1.24.1 is bundled into the API Docker image, so the service runs out of the box on Prowler Cloud and self-hosted alike.Read more in our GitHub provider documentation.
Explore all GitHub checks at Prowler Hub.
🛡️ IaC — SARIF Output for GitHub Code Scanning
The IaC provider now emits SARIF via
--output-formats sarif. Combined with the new GitHub Action, that means IaC misconfigurations land directly in the Security → Code Scanning tab on every PR — annotated on the offending Terraform, CloudFormation, Dockerfile, or Kubernetes manifest, with severity, remediation, and Prowler check metadata carried through.Read more in our IaC provider documentation.
🖥️ UI — Compliance Page Redesign
The compliance page has been rebuilt: client-side search across frameworks, a more compact scan selector trigger, and redesigned compliance cards.
🖥️ UI — Resources, Mutelist, and Filter Polish
A coordinated UX pass across the high-traffic surfaces:
📧 Google Workspace — Gmail Service
The Google Workspace provider gains a new Gmail service with 9 CIS-aligned checks covering user settings, link safety, end-user access, and spam/phishing controls — pulled directly from the Cloud Identity Policy API at the domain level.
gmail_mail_delegation_disabledgmail_shortener_scanning_enabledgmail_external_image_scanning_enabledgmail_untrusted_link_warnings_enabledgmail_pop_imap_access_disabledgmail_auto_forwarding_disabledgmail_per_user_outbound_gateway_disabledgmail_enhanced_pre_delivery_scanning_enabledgmail_comprehensive_mail_storage_enabledExplore all Google Workspace checks at Prowler Hub.
🏛️ Prowler Cloud — Reports for Imported Scans
Imported scans (OCSF) now generate the same downloadable artifacts as CLI scans. The new download buttons are wired into both the scans table and the compliance views, so air-gapped, partner, and offline OCSF imports get the same reporting surface as a connected provider.
Read more in our reports documentation.
📊 CIS Benchmark PDF Reports
Compliance for the latest CIS variant of every provider get a Download PDF button, and the API exposes the underlying generator at
GET /scans/{id}/cis/{name}/. Only the latest CIS version per provider surfaces the button — the backend rejects PDF generation for older variants — so the report you download always matches the benchmark you'd want to ship to an auditor.Read more in our compliance documentation.
👥 Tenant User Expulsion
Tenant owners can now remove users from their organizations directly from the UI. Behind the scenes,
DELETE /tenants/{tenant_pk}/memberships/{id}deletes the expelled user's account when the removed membership was their last one and blacklists every outstanding refresh token, so existing sessions stop minting new access tokens immediately.🔍 New Checks
AWS
secretsmanager_has_restrictive_resource_policy- evaluates resource-based policies for AWS Secrets Manager secrets — thanks to @kagahd!GitHub
repository_default_branch_dismisses_stale_reviews— flags repositories whose default branch protection does not dismiss stale PR approvals when new commits are pushed (CIS 1.1.4) — thanks to @Mathisdjango!Explore all GitHub checks at Prowler Hub.
🙌 External Contributors
Thank you to our community contributors for this release!
--repo-list-fileCLI flag for GitHub provider to load repositories from a file in #10501UI
🚀 Added
knipfor dead code detection withlint:knipandlint:knip:fixscripts (#10654)🔄 Changed
/sign-up?invitation_token=…to/invitation/accept?invitation_token=…; new invitation emails use/invitation/acceptdirectly (#10797)API
🚀 Added
GET /scans/{id}/cis/{name}/(#10650)/overviews/resource-groups(resource inventory),/overviews/categoriesand/overviews/attack-surfacesnow reflect newly-muted findings without waiting for the next scan. The post-mutereaggregate-all-finding-group-summariestask now also dispatchesaggregate_scan_resource_group_summaries_task,aggregate_scan_category_summaries_taskandaggregate_attack_surface_taskper latest scan of every(provider, day)pair, rebuildingScanGroupSummary,ScanCategorySummaryandAttackSurfaceOverviewalongside the tables already covered in #10827 (#10843)🔄 Changed
aggregate_findings,aggregate_attack_surface,aggregate_scan_resource_group_summariesandaggregate_scan_category_summariesnow upsert viabulk_create(update_conflicts=True, ...)instead of the priorignore_conflicts=True/ plain INSERT /already backfilledshort-circuit. Re-runs triggered by the post-mute reaggregation pipeline no longer trip theunique_*_per_scanconstraints nor silently drop updates, and are race-safe under concurrent writers (e.g. scan completion overlapping with a fresh mute rule) (#10843)backfill_*toaggregate_*(#10843)🐞 Fixed
generate_outputs_taskcrashing withKeyErrorfor compliance frameworks listed byget_compliance_frameworksbut not loadable byCompliance.get_bulk(#10903)SDK
🚀 Added
--repo-list-fileCLI flag for GitHub provider to load repositories from a file (#10501)--output-formats sarif(#10626)repository_default_branch_dismisses_stale_reviewscheck for GitHub provider to ensure stale pull request approvals are dismissed when new commits are pushed (#10569)prowler-cloud/prowler@5.25) for running scans in GitHub workflows with optional--push-to-cloudand SARIF upload to GitHub Code Scanning (#10872)secretsmanager_has_restrictive_resource_policycheck for AWS provider (#6985)🐞 Fixed
admincenter_groups_not_public_visibilitycheck for M365 provider evaluating Security and Distribution groups, now restricted to Microsoft 365 (Unified) groups per CIS M365 Foundations 1.2.1 (#10899)provider.identity(#10901)entra_users_mfa_capableevaluating disabled guest accounts; CIS 5.2.3.4 only targets enabled member users (#10785)v5.24.4: Prowler 5.24.4Compare Source
UI
🐞 Fixed
API
🚀 Added
DJANGO_SENTRY_TRACES_SAMPLE_RATEenv var (default0.02) enables Sentry performance tracing for the API (#10873)🔄 Changed
connection_acquisition_timeoutis now configurable viaNEO4J_CONN_ACQUISITION_TIMEOUT(default lowered from 120 s to 15 s) (#10873)v5.24.3: Prowler 5.24.3Compare Source
API
🚀 Added
/overviews/findings,/overviews/findings-severityand/overviews/servicesnow reflect newly-muted findings without waiting for the next scan. The post-mutereaggregate-all-finding-group-summariestask was extended to re-run the same per-scan pipeline that scan completion runs (ScanSummary,DailySeveritySummary,FindingGroupDailySummary) on the latest scan of every(provider, day)pair, keeping the pre-aggregated tables in sync withFinding.mutedupdates (#10827)🐞 Fixed
statusnow treats muted findings as resolved: a group isFAILonly while at least one non-muted FAIL remains, otherwise it isPASS(including fully-muted groups). Thefilter[status]filter and thesort=statusordering share the same semantics, keepingstatusconsistent withfail_countand the orthogonalmutedflag (#10825)aggregate_findingsis now idempotent: it deletes the scan's existingScanSummaryrows beforebulk_create, so re-runs (such as the post-mute reaggregation pipeline) no longer violate theunique_scan_summaryconstraint and no longer abort the downstreamDailySeveritySummary/FindingGroupDailySummaryrecomputation for the affected scan (#10827)SDK
🐞 Fixed
LookupEvents(#10828)me-south-1andme-central-1from default AWS scans to prevent hangs when the host can't reach those regional endpoints (#10837)v5.24.2: Prowler 5.24.2Compare Source
UI
🐞 Fixed
API
🔄 Changed
/resourcesendpoints now materialize the filtered finding IDs into a Python list before filteringResourceFindingMapping(#10816)🐞 Fixed
/finding-groups/latest/<check_id>/resourcesnow selects the latest completed scan per provider by-completed_at(then-inserted_at) instead of-inserted_at, matching the/finding-groups/latestsummary path and the daily-summary upsert so overlapping scans no longer produce divergingdelta/new_countbetween the two endpoints (#10802)v5.24.1: Prowler 5.24.1Compare Source
UI
🐞 Fixed
Status: FAIL) on MultiSelect triggers instead of hiding the placeholder, and add awidewidth option for filter dropdowns applied to the findings Scan filter to prevent label truncation (#10734)severity(#10778)deltaindicator (#10778)-severity,-last_seen_at(#10778)🔒 Security
API
🔄 Changed
SYNC_BATCH_SIZEandFINDINGS_BATCH_SIZEdefaults to 1000, upgrade Cartography to 0.135.0, enable Celery queue priority for cleanup task, rewrite Finding insertion, remove AWS graph cleanup and add timing logs (#10729)🐞 Fixed
tenant_idfilter while getting related findings after scan completes (#10722)pass_count,fail_countandmanual_countnow exclude muted findings (#10753)ResourceFindingMappingbulk insert that left findings orphaned whenINSERT ... ON CONFLICT DO NOTHINGdropped rows without raising; added explicitunique_fields(#10724)SDK
🔄 Changed
msgraph-sdkfrom 1.23.0 to 1.55.0 andazure-mgmt-resourcefrom 23.3.0 to 24.0.0, removingmarshmallowas is a transitively dev dependency (#10733)🐞 Fixed
CloudflareUserTokenRequiredError(#10723)prowler image --registry-listcrashes withAttributeErrorbecauseImageProvider.__init__returns early before registering the global provider (#10691)validate_credentialscan hang in an infinite pagination loop when the SDK repeats accounts, blocking connection tests (#10771)v5.24.0: Prowler 5.24.0Compare Source
✨ New features to highlight in this version
Enjoy them all now for free at https://cloud.prowler.com/
🖥️ Redesigned Resources
The resources detail panel has been rebuilt from the ground up. The new side drawer consolidates resource metadata, associated findings, and events timeline into a cleaner, denser layout — designed to keep you inside the drawer while investigating a resource instead of bouncing back to the list.
🧹 UX and Data Consistency
A large sweep of fixes landed this release targeting the rough edges users actually hit day to day: filter behavior, headers, counters drifting from the underlying data, drawer layouts, and scan/compliance/finding views surfacing stale or mislabeled context.
🆕 AWS Checks
Bedrock Security Hardening
Four new AWS checks tightening the blast radius around Amazon Bedrock and the identities that can reach it:
bedrock_full_access_policy_attached— flags IAM principals withAmazonBedrockFullAccessor equivalent wildcard Bedrock permissions attachediam_role_access_not_stale_to_bedrockandiam_user_access_not_stale_to_bedrock— catch roles and users with Bedrock privileges that haven't been used recently, so dormant GenAI access stops piling up as a standing riskbedrock_vpc_endpoints_configured— verifies Bedrock traffic stays on private VPC endpoints instead of traversing the public internetExplore all AWS Bedrock checks at Prowler Hub.
IAM Marketplace Guardrails
Two new IAM checks to stop the silent path from a compromised identity to a paid marketplace subscription:
iam_policy_no_wildcard_marketplace_subscribeiam_inline_policy_no_wildcard_marketplace_subscribeBoth detect
aws-marketplace:Subscribegranted with wildcards on managed and inline policies — a vector that turns an IAM misconfiguration into a billing incident.Explore all AWS IAM checks at Prowler Hub.
🆕 Microsoft 365 Checks
Entra Conditional Access
entra_conditional_access_policy_all_apps_all_users— ensures at least one CA policy targets every app and every userentra_conditional_access_policy_mfa_enforced_for_guest_users- checks that guest and external users have MFA enforced. Without that compromised external accounts can access tenant resources using only a passwordentra_conditional_access_policy_block_unknown_device_platforms- block access from unknown device platformsentra_conditional_access_policy_corporate_device_sign_in_frequency_enforced- enforces sign in for non-corporate devices, without that user sessions may persist indefinitely on unmanaged devicesentra_conditional_access_policy_directory_sync_account_excluded— validates that the directory sync service account is excluded from restrictive CA policies to prevent sync outagesExplore all M365 Entra checks at Prowler Hub.
Intune
intune_device_compliance_policy_unassigned_devices_not_compliant_by_default— unassigned devices should not be marked compliant by default by the built-in device policyExplore all M365 Intune checks at Prowler Hub.
Exchange Online
exchange_organization_delicensing_resiliency_enabled— keeps mailbox data accessible for 30 days after a license is removed, preventing accidental data lossExplore all M365 Exchange checks at Prowler Hub.
🆕 Exclude Regions in AWS scans
Prowler now lets you exclude specific AWS regions from scans, so you can keep your scan scope focused on the regions that matter to you. You can configure exclusions with
--excluded-regionPROWLER_AWS_DISALLOWED_REGIONSenvironment variableaws.disallowed_regionsinconfig.yamlSee the AWS Regions and Partitions documentation for usage examples.
UI
🚀 Added
🔄 Changed
/findingsin a new tab, preserving graph zoom, selection, and filter state🐞 Fixed
API
🔄 Changed
2.3.4in Dockerfile and pre-commit hooks. Regenerateapi/poetry.lock(#10681)cleanup_findingsno-op and its supportingprowler_finding_lastupdatedindex (#10684)🐞 Fixed
sleep 15with API service healthcheck dependency (Docker Compose) and init containers (Helm), aligned Gunicorn default port to8080(#10603)🔐 Security
pytestfrom 8.2.2 to 9.0.3 to fix CVE-2025-71176 (#10678)SDK
🚀 Added
entra_conditional_access_policy_directory_sync_account_excludedcheck for M365 provider (#10620)intune_device_compliance_policy_unassigned_devices_not_compliant_by_defaultcheck for M365 provider (#10599)entra_conditional_access_policy_all_apps_all_userscheck for M365 provider (#10619)bedrock_full_access_policy_attachedcheck for AWS provider (#10577)iam_role_access_not_stale_to_bedrockandiam_user_access_not_stale_to_bedrockchecks for AWS provider (#10536)iam_policy_no_wildcard_marketplace_subscribeandiam_inline_policy_no_wildcard_marketplace_subscribechecks for AWS provider (#10525)bedrock_vpc_endpoints_configuredcheck for AWS provider (#10591)exchange_organization_delicensing_resiliency_enabledcheck for M365 provider (#10608)entra_conditional_access_policy_mfa_enforced_for_guest_userscheck for M365 provider (#10616)entra_conditional_access_policy_corporate_device_sign_in_frequency_enforcedcheck for M365 provider (#10618)entra_conditional_access_policy_block_unknown_device_platformscheck for M365 provider (#10615)--excluded-regionCLI flag,PROWLER_AWS_DISALLOWED_REGIONSenvironment variable, andaws.disallowed_regionsconfig entry to skip specific AWS regions during scans (#10688)🔄 Changed
2.3.4and consolidate SDK workflows onto thesetup-python-poetrycomposite action with opt-in lockfile regeneration (#10681)🐞 Fixed
v5.22.0: Prowler 5.22.0Compare Source
✨ New features to highlight in this version
Enjoy them all now for free at https://cloud.prowler.com
Findings page — Batch filter apply
Selecting filters no longer triggers a page re-render on each change. A new "Apply Filters" button lets you configure multiple filters before executing the query, fixing layout shifts and improving responsiveness.
Attack Paths — Custom queries
Run custom
openCypherqueries against your Attack Paths graph alongside predefined queries. Use Lighthouse AI to help generate them.Predefined Attack Paths queries now run faster 🚀
Read more about it in Attack Paths documentation
🙌 Community Contributors
defusedxmlin SAML metadata parsing to prevent XML bomb (billion laughs) DoS attacks (#10165)UI
🚀 Added
🔄 Changed
API
🚀 Added
check_titlesubstring filtering (#10377)🐞 Fixed
🔐 Security
defusedxmlin SAML metadata parsing to prevent XML bomb (billion laughs) DoS attacks (#10165)flaskto 3.1.3 (CVE-2026-27205) andwerkzeugto 3.1.6 (CVE-2026-27199) (#10430)SDK
🐞 Fixed
vm_backup_enabledandvm_sufficient_daily_backup_retention_periodchecks now compare VM names case-insensitively to avoid false negatives when Azure stores backup item names in a different case (#10395)entra_non_privileged_user_has_mfaskips disabled users to avoid false positives (#10426)v5.21.1: Prowler 5.21.1Compare Source
API
🐞 Fixed
COUNT(DISTINCT)overhead (#10394)v5.21.0: Prowler 5.21.0Compare Source
✨ New features to highlight in this version
Enjoy them all now for free at https://cloud.prowler.com
🏛️ Google Workspace - Full App Support
Google Workspace provider is now fully integrated with the Prowler App. You can now connect and scan your Google Workspace environment directly from the UI.
Read more in our Google Workspace documentation.
Explore all Google Workspace checks at Prowler Hub.
🤖 Lighthouse AI
We've added a new system to provide AI skills to Lighthouse AI alongside the first one: Attack Path Custom Query. This skill provides the LLM with
openCyphersyntax guidance and Cartography schema knowledge for writing graph queries against Prowler's data.This was included alongside a new tool in the Prowler MCP to get the Cartography's scan schema.
📖 Check Metadata
We've completed the check's metadata migration to the new format 🎉 Now all are structured in the same way.
Huge shoutout to the Prowler's Detection&Remediation team for this massive effort!
Read more in our Check Metadata Guidelines
⌛ AWS Resource Timeline
You can now see the last 90 days of AWS CloudTrail events for a given findings!
AWS resource modification history is now visible directly in the App. A new Events tab in Findings and Resource detail cards shows an AWS CloudTrail timeline with expandable event rows, actor details, request/response JSON payloads, and error information. A read-event toggle lets you include or exclude read-only API calls from the timeline.
🐳 Container Image
Container Image provider is now fully integrated with the Prowler App. You can now connect and scan your container registry directly from the UI.
Read more in our Container Image documentation.
🏛️ AWS Organizations Improvements
We've upgraded AWS Organizations management in the Cloud Providers page with greater flexibility and control. You can now edit organization names and credentials, run connection tests across all accounts or scoped to a specific organizational unit, and delete individual organizational units or full organizations.
🕸️ Attack Paths Improvements
We continued improving Attack Paths UX by improving performance and adding more labels to improve filtering when using custom queries.
📄 Compliance
We've improved compliance coverage with the following frameworks:
🔍 New Checks
Microsoft 365
entra_conditional_access_policy_device_code_flow_blocked- Conditional Access policy blocks device code flow to prevent phishing attacksentra_conditional_access_policy_require_mfa_for_admin_portals- Conditional Access policy requires MFA for Microsoft Admin PortalsExplore all Microsoft 365 checks at Prowler Hub.
Github
organization_repository_deletion_limited- Organization repository deletion and transfer is restricted to owners - Thanks to @shalkodaExplore all Github checks at Prowler Hub.
🙌 Community Contributors
organization_repository_deletion_limitedcheck for Github (#10185)--regionflag (#9952)CORS_ALLOWED_ORIGINSconfigurable via environment variable (#10355)UI
🚀 Added
🔄 Changed
API
🚀 Added
CORS_ALLOWED_ORIGINSconfigurable via environment variable (#10355)🔄 Changed
🐞 Fixed
graph_data_readyflag when scan fails during graph swap, preventing query endpoints from staying blocked until the next successful scan (#10354)🔐 Security
psycopg2.sqlto safely compose DDL inPostgresEnumMigration, preventing SQL injection via f-string interpolation (#10166)SDK
🚀 Added
misconfigscanner as default for Image provider scans (#10167)entra_conditional_access_policy_device_code_flow_blockedcheck for M365 provider (#10218)entra_conditional_access_policy_require_mfa_for_admin_portalscheck for Azure provider and update CIS compliance (#10330)organization_repository_deletion_limitedcheck for GitHub provider (#10185)🔄 Changed
pygithubfrom 2.5.0 to 2.8.0 to use native Organization properties🐞 Fixed
--regionflag (#9952)🔐 Security
multipartto 1.3.1 to fix GHSA-p2m9-wcp5-6qw3 (#10331)MCP
🚀 Added
v5.20.0: Prowler 5.20.0Compare Source
✨ New features to highlight in this version
Enjoy them all now for free at https://cloud.prowler.com
🏛️ AWS Organizations Improvements
🕸️ Attack Paths Improvements
APOCto standardopenCyphermigration: Network exposure queries now use standard openCypher instead of APOC procedures, making them use better open standards🏛️ Google Workspace - API Only
Google Workspace is now fully integrated with the Prowler API. After being introduced as a CLI-only provider in v5.19.0, you can now connect and scan your Google Workspace environment directly from the API. Full App support will be included in the next release.
Read more in our Google Workspace documentation.
Explore all Google Workspace checks at Prowler Hub.
☁️ OpenStack — Object Storage Service
OpenStack continues to expand with a brand new Object Storage service adding 7 security checks covering container access control, versioning, encryption, metadata hygiene, and lifecycle management.
Read more in our OpenStack documentation.
Explore all OpenStack checks at Prowler Hub.
🔍 New Checks
AWS
guardduty_delegated_admin_enabled_all_regions- Verify that a delegated administrator account is configured for GuardDuty - Thanks to @m-wentz!opensearch_service_domains_not_publicly_accessible- Now supports atrusted_ipsconfiguration option. If your OpenSearch domain has a resource policy restricting access to known IPs, you no longer get a false positive on the public accessibility check — Thanks to @codename470!Explore all AWS checks at Prowler Hub.
Microsoft 365
entra_conditional_access_policy_approved_client_app_required_for_mobile— Requires approved client apps on mobile devicesentra_conditional_access_policy_compliant_device_hybrid_joined_device_mfa_required— Requires compliant/hybrid-joined device or MFAExplore all M365 checks at Prowler Hub.
🐞 Bug Fixes
We've added several bug fixes to improve the user experience across the application.
⛵ Community Helm Chart
Prowler now has an official community-maintained Helm chart for self-hosted deployments on Kubernetes. The chart is published as an OCI artifact to
oci://ghcr.io/prowler-cloud/charts/prowleron every release.Check it on https://ghcr.io/prowler-cloud/charts/prowler
Thanks to @Ca-moes and @Utwo for building and maintaining this chart!
🙌 Community Contributors
guardduty_delegated_admin_enabled_all_regionscheck for AWS (#9867)trusted_ipsconfig for OpenSearch check (#8631)Configuration
📅 Schedule: (UTC)
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.