Skip to content

Inspector Scan - False Negative #7597

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
victor-babin-fti opened this issue Apr 24, 2025 · 1 comment · Fixed by #7670
Closed

Inspector Scan - False Negative #7597

victor-babin-fti opened this issue Apr 24, 2025 · 1 comment · Fixed by #7670
Assignees
Labels
bug provider/aws Issues/PRs related with the AWS provider severity/medium Results in some unexpected or undesired behavior.

Comments

@victor-babin-fti
Copy link

Steps to Reproduce

Hi,

As I was testing Prowler on a relatively big environment, I was surprised not to see in the output any "failed"/findings regarding Inspector having existing active findings. The environment I tested on has 1K+ findings/vulnerabilities listed on AWS (manual enumeration), including:

  • Findings with fix available;
  • Findings with public exploit available; and
  • Critical Findings.

After using the search feature on Prowler (App), I found an entry which is categorised as "pass" and that "no active findings" has been identified in Inspector on that same account ID and region.

What would make Prowler miss this?

Expected behavior

Report the findings listed on Inspector.

Actual Result with Screenshots or Logs

Image

How did you install Prowler?

Docker (docker pull toniblyx/prowler)

Environment Resource

N/A

OS used

N/A

Prowler version

Latest

Pip version

N/A

Context

No response

@MrCloudSec MrCloudSec self-assigned this Apr 24, 2025
@MrCloudSec
Copy link
Member

@victor-babin-fti thanks for reporting this.

This likely happens because the credentials used don’t have permission to list Inspector findings. If the credentials don’t have permission to access Inspector findings, that check shouldn't return any result at all, instead of showing a PASS with 0 findings. That’s misleading and needs to be fixed.

We’ll update the logic so that if permissions are missing, the check is skipped or flagged accordingly, not silently passed.

Appreciate the heads-up.

@MrCloudSec MrCloudSec added severity/medium Results in some unexpected or undesired behavior. provider/aws Issues/PRs related with the AWS provider and removed status/needs-triage Issue pending triage labels Apr 24, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug provider/aws Issues/PRs related with the AWS provider severity/medium Results in some unexpected or undesired behavior.
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants