Skip to content

High-signal, read-only IAM analysis tool that detects privilege escalation paths via Service Account impersonation and trust overlap in Google Cloud.

License

Notifications You must be signed in to change notification settings

panoskoufodinas-tech/iam-privilege-path-inspector

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

IPPI — Identity Privilege Path Inspector IPPI (Identity Privilege Path Identification) is more than a tool; it is a specialized security framework for mapping deterministic privilege escalation in complex Cloud environments. It serves as the foundation for a unified identity reasoning ecosystem.

IPPI finds privilege escalation paths that traditional scanners ignore. Most IAM tools list permissions; IPPI shows how identities overlap until someone becomes admin.

Why IPPI Exists Cloud breaches rarely start with “Owner access”. They start with:

A forgotten Service Account

A deleted identity

A legacy Editor role

Impersonation paths nobody mapped

IPPI answers one question: “Who can become what — and how?”

What IPPI Does (and what it does NOT) IPPI does:

Methodology-Driven Analysis: Implements the IPPI framework to identify identity pivots.

Read-only IAM analysis: Safe for production environments.

High-signal discovery: Finds privilege paths, not just misconfigurations.

Audit-Ready Evidence: Produces JSON artifacts for downstream reasoning tools.

IPPI does NOT:

Scan ports / Check CVEs

Perform exploitation

Modify any cloud resources

Example Finding 📂 samples/discovery.json Evidence. This is a real-world pattern:

Deleted Service Account

Still bound to Editor

Hidden privilege overlap

Who This Is For Cloud Security Engineers & IAM Auditors

Red & Blue Teams

CTOs who want signal, not noise

The IPPI Ecosystem & Roadmap IPPI is the core detection engine. It is designed to work in tandem with:

Cloud-IAM-Trust-Simulator: For modeling theoretical trust transitivity.

Cloud-IAM-Drift-Architect: For synthesizing findings into architectural risk reports.

Future ideas:

Privilege path visualization

Blast radius estimation

Natural language explanations for non-security stakeholders

Support the Project IPPI is free for everyone. If this tool saved you time, reduced risk, or helped an audit, you can support development via GitHub Sponsors.

No paywall. No locked features.

About

High-signal, read-only IAM analysis tool that detects privilege escalation paths via Service Account impersonation and trust overlap in Google Cloud.

Topics

Resources

License

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages