Skip to content

[comp] Production Deploy#2856

Merged
tofikwest merged 2 commits into
releasefrom
main
May 15, 2026
Merged

[comp] Production Deploy#2856
tofikwest merged 2 commits into
releasefrom
main

Conversation

@github-actions
Copy link
Copy Markdown
Contributor

@github-actions github-actions Bot commented May 15, 2026

This is an automated pull request to release the candidate branch into production, which will trigger a deployment.
It was created by the [Production PR] action.


Summary by cubic

Use the IAM Credential Report to check for root access keys, fixing false positives where inactive keys were flagged as critical. The check is now a dedicated module with polling and safe-skip behavior, and the IAM adapter calls it.

  • Bug Fixes

    • Switched from GetAccountSummary to GenerateCredentialReport + GetCredentialReport from @aws-sdk/client-iam.
    • Parse the <root_account> row to detect access_key_1_active/access_key_2_active; only fail when any is true.
    • Skip the check when the report/root row isn’t available or on permission errors.
  • Refactors

    • Extracted logic into iam-root-access-keys.ts and updated the adapter to use checkRootAccessKeys.
    • Added focused unit tests covering active/inactive keys, no root row, errors, and retry polling.

Written for commit 2e58e26. Summary will update on new commits.

github-actions Bot and others added 2 commits May 15, 2026 00:22
…heck (#2846)

The check previously called GetAccountSummary and read AccountAccessKeysPresent,
which returns 1 when the root account has *any* access keys — active or
inactive. That produced a critical false positive for accounts that only had
a disabled root key sitting on them: AWS Console correctly said "Root user has
no active access keys" while our scan reported "Root account has active access
keys" at critical severity.

Switch to GenerateCredentialReport + GetCredentialReport (same source AWS
Console's IAM Dashboard recommendation panel uses). Parse the <root_account>
row's access_key_1_active / access_key_2_active columns directly so we report
exactly what AWS Console reports.

- Extract the check into apps/api/src/cloud-security/providers/aws/iam-root-access-keys.ts
  so it can be unit-tested in isolation.
- Drop the old in-adapter implementation and the now-unused GetAccountSummary
  import. iam.adapter.ts shrinks from 308 → 266 lines.
- Add 16 unit tests covering: customer's exact scenario (inactive-only key
  passes), each active-key column, both active, no root row (safe skip),
  permission errors (safe skip), and the polling/retry path on
  CredentialReportNotReadyException.

Co-authored-by: Tofik Hasanov <annexcies@gmail.com>
Co-authored-by: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Co-authored-by: Tofik Hasanov <72318342+tofikwest@users.noreply.github.com>
@vercel
Copy link
Copy Markdown

vercel Bot commented May 15, 2026

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Actions Updated (UTC)
comp-framework-editor (staging) Ready Ready Preview, Comment May 15, 2026 1:47pm
2 Skipped Deployments
Project Deployment Actions Updated (UTC)
app (staging) Skipped Skipped May 15, 2026 1:47pm
portal (staging) Skipped Skipped May 15, 2026 1:47pm

Request Review

Copy link
Copy Markdown
Contributor

@cubic-dev-ai cubic-dev-ai Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No issues found across 3 files

Confidence score: 5/5

  • Automated review surfaced no issues in the provided summaries.
  • No files require special attention.

Re-trigger cubic

@tofikwest tofikwest merged commit e799f51 into release May 15, 2026
14 checks passed
@claudfuen
Copy link
Copy Markdown
Contributor

🎉 This PR is included in version 3.55.1 🎉

The release is available on GitHub release

Your semantic-release bot 📦🚀

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants