Skip to content


Repository files navigation

rpCheckup - Catch AWS resource policy backdoors like Endgame

Screen Shot 2021-03-08 at 11 38 48 AM

rpCheckup is an AWS resource policy security checkup tool that identifies public, external account access, intra-org account access, and private resources. It makes it easy to reason about resource visibility across all the accounts in your org.


We (Gold Fig Labs) built rpCheckup based on a part of how we assess customer AWS accounts. While there are many tools to assess and analyze IAM policies, the same treatment for policies attached to resources is a blind spot. As product iteration sometimes necessitates overprovisioned access to just get things working, finding such issues after the fact across a slew of different AWS resource types, accounts, and regions isn't straightforward.

rpCheckup generates an HTML & CSV report to make this easy.

Supported AWS Resources

rpCheckup uses the resources supported by Endgame as the high-water mark for analyzing attached policies.

Resource Type rpCheckup Endgame AWS Access Analyzer
ACM Private CAs
CloudWatch Resource Policies
EBS Volume Snapshots
ECR Container Repositories
EFS File Systems
ElasticSearch Domains
Glacier Vault Access Policies
IAM Roles
KMS Keys
Lambda Functions
Lambda Layers
RDS DB Snapshots
RDS Cluster Snapshots
S3 Buckets
Secrets Manager Secrets
SES Sender Authorization Policies
SQS Queues
SNS Topics


  • AWS credentials (~/.aws/, env variables, metadata server, etc)
  • Docker
  • If running from source; go version >= go1.15


  1. Download the latest release:


curl -Lo rpCheckup
chmod a+x ./rpCheckup

OSX x86:

curl -Lo rpCheckup
chmod a+x ./rpCheckup

OSX M1/arm:

curl -Lo rpCheckup
chmod a+x ./rpCheckup
  1. Run from source:
git clone
cd rpCheckup
go run main.go


Run ./rpCheckup and view the generated report found in output/.

Screen Shot 2021-03-01 at 12 22 36 PM


rpCheckup needs read-only access to portions of your AWS account. A principal (user/role/group) needs the following to make full use of rpCheckup:

AWS Managed Policy: arn:aws:iam::aws:policy/SecurityAudit
AWS Managed Policy: arn:aws:iam::aws:policy/job-function/ViewOnlyAccess
Additional Permissions:

Additionally, there is a Terraform Module for creating a role with the appropriate credentials, as well as a shell script for running with an assumed role (requires running ./ first).


rpCheckup uses goldfiglabs/introspector to snapshot the configuration of your AWS account. rpCheckup runs SQL queries to generate findings based on this snapshot. Introspector does the heavy lifting of importing and normalizing the configurations while rpCheckup is responsible for querying and report generation.


If the account you are scanning is not the master account in an Organization, other accounts in the Organization may be detected as external accounts. This is because non-master accounts may not have access to see the organization structure.

Since rpCheckup relies on Introspector's snapshots, rpCheckup is unable to detect policies that are no longer attached. When detecting flapping or transient access, please use tools which utilize audit and security logs (CloudTrail, etc). See here for further information in preventing resource exposure.

Sample Reports

See sample reports in sample/

Screen Shot 2021-02-26 at 9 59 12 PM

rpCheckup report against Endgame sample account:

Screen Shot 2021-03-02 at 4 05 40 PM


Copyright (c) 2019-2021 Gold Fig Labs Inc.

This Source Code Form is subject to the terms of the Mozilla Public License, v.2.0. If a copy of the MPL was not distributed with this file, You can obtain one at

Mozilla Public License v2.0