logo

Database

Terraform Trust Policy Wildcard Action

Description

Detects overly permissive trust policies in AWS IAM roles that use wildcard (*) actions. This represents a security risk since wildcards in IAM trust policies could allow unintended services or principals to assume the role, potentially leading to privilege escalation or unauthorized access.

Weakness:

325 - Excessive privileges - Wildcards

Category: Access Subversion

Detection Strategy

    Scans Terraform configuration files for aws_iam_role resources

    Examines the assume role trust policy document within the IAM role

    Reports a vulnerability if the trust policy contains action statements with wildcards (*)

    Specifically focuses on the Action or actions field within the trust policy Statement blocks

Vulnerable code example

resource "aws_iam_role" "example_role" {
  name = "vulnerable_role"

  # Vulnerable: Overly permissive policy allows all actions on all resources
  assume_role_policy = jsonencode({
    Version = "2012-10-17"
    Statement = [
      {...

✅ Secure code example

resource "aws_iam_role" "example_role" {
  name = "secure_role"

  # Secure: Explicit assume role policy with limited permissions
  assume_role_policy = jsonencode({
    Version = "2012-10-17"
    Statement = [
      {...