itsMe Posted October 17, 2023 Share Posted October 17, 2023 This is the hidden content, please Sign In or Sign Up This is a GCP resource scanner that can help determine what level of access certain credentials possess on GCP. The scanner is designed to help security engineers evaluate the impact of a certain VM/container compromise, GCP service account or OAuth2 token key leak. Currently, the scanner supports the following GCP resources: GCE GCS GKE App Engine Cloud SQL BigQuery Spanner Pub/Sub Cloud Functions BigTable CloudStore KMS Cloud Services The scanner supports SA impersonation The scanner supports extracting and using the following types of credentials: GCP VM instance metadata; User credentials stored in gcloud profiles; OAuth2 Refresh Token with cloud-platform scope granted; GCP service account key in JSON format. The scanner does not rely on any third-party tool (e.g. gcloud). Thus, it can be compiled as a standalone tool and used on a machine with no GCP SDK installed (e.g. a Kubernetes pod). However, please keep in mind that the only OS that is currently supported is Linux. Please note that GCP offers Policy Analyzer to find out which principals (users, service accounts, groups, and domains), have what access to which Google Cloud resources. However, it requires specific permissions on the GCP project and the Cloud Assets API needs to be enabled. If you just have a GCP SA key, access to a previously compromised VM, or an OAUth2 refresh token, gcp_scanner is the best option to use. Disclaimer This project is not an official Google project. It is not supported by Google and Google specifically disclaims all warranties as to its quality, merchantability, or fitness for a particular purpose. This is the hidden content, please Sign In or Sign Up Link to comment Share on other sites More sharing options...
Recommended Posts