S3 Bucket Public-Access Audit

The agent checks every S3 bucket policy and ACL daily. If a bucket becomes public — or if an existing policy changes — it fires an immediate WhatsApp alert with the diff.

Cron + WhatsApp DMs3securityaudit

Conversation example

Cron triggered: S3 public-access audit (every 4 hours)
http_request → S3 GetPublicAccessBlock + GetBucketPolicy

Listing 37 S3 buckets and checking PublicAccessBlock, bucket policies, and ACLs...

whatsapp_web_send

S3 Audit — April 12, 14:00 UTC Buckets scanned: 37 Safe: 36 Exposed: 1 ← new Risk: lunogen-uploads-staging - Public READ just enabled at 13:42 UTC - Changed by: daniel-p@lunogen.com via Console - Current objects: 14,280 files (2.4 GB) - Policy diff attached This might be intentional (staging CDN), but the bucket contains user-uploaded content. Paging @daniel-p on WhatsApp to confirm. If it's a mistake, say 'revert bucket' and I'll reapply the previous policy.

More AWS use cases

Deploy this in minutes

Create a LunoGen agent, connect AWS, and start running this workflow from WhatsApp today.

Back to AWS