| ▲ | mattmanser a day ago | ||||||||||||||||
I didn’t look at a line of code... I know it’s secure - I validated the endpoints can’t be accessed unauthenticated and the IAM role Oh god, this made me laugh so hard. Best 'we gonna get hacked' comment of the day. | |||||||||||||||||
| ▲ | raw_anon_1111 a day ago | parent [-] | ||||||||||||||||
Please tell me how is going to be “hacked”? A) The IAM role of the Lambda runtime it’s running in is least privileged and only has access read and write access to the required S3 bucket and other required AWS services and even those are tightly scoped. B) For authentication I used Amazon Cognito and ran a curl shell script against each endpoint for authentication vs non authenticated end points C) The database user has least privilege access So how pray tell could insecure code overcome that? | |||||||||||||||||
| |||||||||||||||||