Releases: prowler-cloud/prowler
Prowler 5.28.0
✨ New features to highlight in this version
Enjoy them all now for free at https://cloud.prowler.com
🆔 Okta - Prowler App
Okta lands in Prowler App.
Authenticate with read-only OAuth credentials and scan your Okta tenant from the App in minutes.
The signon service also grows from 1 to 5 checks. Four new medium-severity checks cover the rest of the DISA STIG Okta IDaaS V1R2 Global Session Policy and sign-in banner controls:
signon_global_session_lifetime_18h— V-273203 / OKTA-APP-001665. Global session maximum lifetime must be 18 hours or less.signon_global_session_cookies_not_persistent— V-273206 / OKTA-APP-001710. Global session cookies must not be persistent across browser restarts.signon_global_session_policy_network_zone_enforced— V-279691 / OKTA-APP-003242. Global Session Policy rules must enforce a network zone constraint.signon_dod_warning_banner_configured— V-273192 / OKTA-APP-000200. The customized sign-in page must display the DoD-mandated warning banner.
Note
The banner check requires reading Okta brands and customized sign-in pages, so okta.brands.read is now part of DEFAULT_SCOPES. Existing Okta service apps must grant it before upgrading.
Read more in our Okta provider documentation.
Explore all Okta checks at Prowler Hub.
🧾 Finding Evidence
The finding detail drawer in the Prowler App now exposes a dedicated "Resource Metadata / Evidence" tab, backed by a new resource.metadata attribute on /api/v1/findings?include=resources.
The tab surfaces the raw resource attributes Prowler captured at scan time, the evidence behind every PASS / FAIL, in one click from the finding. No more jumping out to the source-of-truth console just to confirm what the scanner saw.
🤖 Prowler for Claude Code
Prowler ships a Claude Code plugin and marketplace so Claude can drive end-to-end cloud security and compliance assessments through the Prowler MCP server, against a Prowler Cloud-connected account.
Install it from inside Claude Code:
/plugin marketplace add prowler-cloud/prowler
/plugin install prowler@prowler-plugins
From there, Claude can walk an provider through a chosen security or industry framework and remediate findings until the framework is compliant.
Note
The plugin is in preview and under active development. Please report issues on GitHub or join the Slack community for feedback.
Read more in our Prowler for Claude Code documentation.
📧 Google Workspace — Sites, Marketplace, Additional services, Groups
The Google Workspace provider gains four new services and six new checks through the Cloud Identity Policy API:
- Sites —
sites_service_disabled: verifies legacy Google Sites is disabled for the organization so users cannot publish unmanaged Sites pages. - Additional services —
additionalservices_external_groups_disabled: verifies the Additional Google services > Google Groups toggle is disabled, blocking users from accessing external groups from their corporate account. - Marketplace —
marketplace_apps_access_restricted: verifies third-party Marketplace apps are restricted (admin-approved only or fully blocked) instead of letting any user install arbitrary apps. - Groups — 3 new checks for Google Groups for Business:
-groups_creation_restricted— verifies group creation is restricted to admins, preventing user-created groups that bypass access reviews.
-groups_external_access_restricted— verifies groups cannot be made accessible to users outside the organization.
-groups_view_conversations_restricted— verifies non-members cannot view group conversations.
Read more in our Google Workspace provider documentation.
Explore all Google Workspace checks at Prowler Hub.
🆕 New Checks
AWS
ses_identity_dkim_enabled— verifies DKIM signing is enabled on every SES identity (domain or email) so outbound email is cryptographically signed and resistant to spoofing. Thanks to @mohamedsolaiman!sagemaker_models_registry_in_use— verifies at least one SageMaker Model Package Group has an approved model package, enforcing ML governance workflows through the SageMaker Model Registry. Thanks to @cascioli!
M365
entra_app_registration_client_secret_unused— flags Entra ID app registration client secrets that have never been used or have not been used for a configurable amount of days, so dormant credentials can be revoked before they leak. Thanks to @AlexanderSanin and @PrettyFox0!
GCP
cloudsql_instance_cmek_encryption_enabled— verifies Cloud SQL instances are encrypted with a customer-managed encryption key (CMEK) instead of Google-managed defaults. Thanks to @s1ns3nz0!
🔐 Security Updates
- MCP Server —
fastmcp2.14.0 → 3.2.4 for GHSA-5h2m-4q8j-pqpj, GHSA-rww4-4w9c-7733 and GHSA-vv7q-7jx5-f767. The bump also pulls fixedjaraco.context,python-multipartandstarlette, and drops the vulnerablelupaandurllib3transitive dependencies.
🙌 External Contributors
Thank you to our community contributors for this release!
- @mohamedsolaiman — Add
ses_identity_dkim_enabledcheck for AWS provider in #10923 - @cascioli — Add
sagemaker_models_registry_in_usecheck for AWS provider in #11196 - @s1ns3nz0 — Add
cloudsql_instance_cmek_encryption_enabledcheck for GCP provider in #11023 - @Ker102 — Fix OCI Audit service configuration lookup to use the tenancy home region in #10347
- @sandiyochristan — Use PowerShell best practices for quoting credential variables in the M365 provider in #9997
- @AlexanderSanin and @PrettyFox0 — Add
entra_app_registration_client_secret_unusedcheck for M365 provider in #11232
UI
🚀 Added
oktaprovider support with OAuth 2.0 private-key JWT credentials form (client ID + PEM private key) (#11213)- "Resource Metadata / Evidence" tab in the finding detail drawer (#11187)
🐞 Fixed
- Resource detail panels: metadata editor now scrolls internally with the minimal scrollbar across the finding drawer and
/resources/:id, tab labels truncate with tooltips on narrow widths, and "View in AWS Console" moved from the resource UID row to the resource actions menu (#11325)
API
🚀 Added
oktaprovider support (#11184)resource.metadataattribute included in/api/v1/findings?include=resources(#11187)
SDK
🚀 Added
- Sites, Additional Google services, and Marketplace checks for Google Workspace provider using the Cloud Identity Policy API (#11281)
entra_app_registration_client_secret_unusedcheck for M365 provider (#11232)cloudsql_instance_cmek_encryption_enabledcheck for GCP provider (#11023)- Google Workspace Groups service with 3 new checks (#11186)
ses_identity_dkim_enabledcheck for AWS provider (#10923)sagemaker_models_registry_in_usecheck for AWS provider, verifying that at least one SageMaker Model Package Group has an approved model package to enforce ML governance workflows (#11196)signon_dod_warning_banner_configured,signon_global_session_lifetime_18h,signon_global_session_cookies_not_persistentandsignon_global_session_policy_network_zone_enforcedchecks for Okta provider (#11224)
🔄 Changed
OktaProvider.test_connectionaccepts an optionalprovider_id(org domain) and raisesOktaInvalidProviderIdError(14007) when it doesn't match the authenticated org — guards against stored UID drifting from the credentials' org (#11184)- Use single-quoted strings for credential variables in the M365 provider PowerShell session, following PowerShell best practices for literal values (#9997)
🐞 Fixed
- OCI Audit service configuration lookup when the configured region differs from the tenancy home region (#10347)
- Container image now uses an absolute
ENTRYPOINT(/home/prowler/.venv/bin/prowler) so it works under any runtime--workdir. The relative entrypoint was breaking the official GitHub Action (prowler-cloud/prowler@v5.27.0) and anydocker runwith a custom-w[(#11313)](ht...
Prowler 5.27.1
SDK
🐞 Fixed
s3_bucket_shadow_resource_vulnerabilityno longer emits a tautologicalPASSfinding for every bucket; a finding is now produced only when the bucket name matches one of the predictable service patterns (Glue, SageMaker, EMR, CodeStar) (#11220)sqlserver_tde_encrypted_with_cmkcheck for Azure provider no longer reports a falseFAILfor SQL Servers whose user databases are correctly encrypted with a customer-managed key, by excluding the systemmasterdatabase (always reports TDEDisabledand is not customer-controllable) from the TDE evaluation (#11233)
Prowler 5.27.0
✨ New features to highlight in this version
Enjoy them all now for free at https://cloud.prowler.com
🆔 New Provider: Okta (CLI-Only)
Prowler now scans Okta as a first-class provider. Authenticate with OAuth read-only credentials using an application and start auditing your Okta tenant in minutes.
export OKTA_ORG_DOMAIN="your-tenant.okta.com"
export OKTA_CLIENT_ID="0oa1234567890abcdef"
export OKTA_PRIVATE_KEY_FILE="/path/to/prowler-okta.pem"
prowler oktaThe release ships with the signon service and one DISA STIG-mapped check:
signon_global_session_idle_timeout_15min— maps to DISA STIG V-273186 / OKTA-APP-000020: the Default Policy must have a Priority 1 rule (not the built-in Default Rule) that sets Maximum Okta global session idle time to 15 minutes or less.
More services, checks, the STIG v1 Okta compliance framework, and full Prowler API / UI integration are coming in follow-up releases.
Read more in our Okta provider documentation.
Explore all Okta checks at Prowler Hub.
📧 Google Workspace — Chat service
The Google Workspace provider grows again with the new Chat service and 6 CIS-mapped checks landing via the Cloud Identity Policy API:
chat_apps_installation_disabled— verifies third-party Chat apps cannot be installed by users, blocking unsanctioned access to email, conversation content, and organizational data.chat_external_file_sharing_disabled— verifies users cannot share files with people outside the organization via Chat conversations.chat_external_messaging_restricted— verifies messaging with users outside the organization is either disabled or restricted to allowlisted domains.chat_external_spaces_restricted— verifies external Chat spaces are either disabled or restricted to allowlisted domains.chat_incoming_webhooks_disabled— verifies incoming webhooks are disabled so external applications cannot post into Chat spaces.chat_internal_file_sharing_disabled— verifies file sharing between internal users in Chat is disabled, for organizations that need to audit all internal file flows.
Read more in our Google Workspace provider documentation.
Explore all Google Workspace checks at Prowler Hub.
🕸️ Attack Paths — Redesigned Graph
The Attack Paths graph in the Prowler App has been rewritten on React Flow, replacing the previous D3 + Dagre implementation. The new graph ships with:
- Improved layout and node clustering
- Smoother pan, zoom, and selection interactions
- Image export
- A minimap for orientation on dense graphs
☁️ AWS — "View in AWS Console"
AWS findings and resource details in the Prowler App now expose a one-click "View in AWS Console" link that opens the resource directly in the AWS Console. Jumping from a finding straight to the offending resource in the source-of-truth console is one click away.
☁️ AWS — IAM checks focus on attached customer-managed policies
AWS IAM customer-managed policy checks now scan only attached policies by default. Unattached customer-managed policies no longer emit a FAIL. They're inert, they're not in any principal's effective permissions, and they were generating findings on accounts that legitimately keep policies around for staged rollouts or break-glass scenarios. To keep auditing unattached policies (and other unused-service surfaces), opt in with --scan-unused-services, matching the existing semantics for the rest of the unused-services scope.
🤖 Lighthouse AI — Finding Groups MCP tools
Lighthouse AI can now reason about Finding Groups end to end. The new Finding Groups MCP tools let Lighthouse AI list, filter and inspect grouped findings, the same lens analysts use to triage at scale, instead of being limited to individual findings.
Read more about it in our Lighthouse AI documentation
📄 PDF Compliance Reports — Performance Improvements
We've introduce two important changes to the Compliance Reports in PDF:
- Only failed findings in the PDF. PDFs now focus on what needs action.
PASSfindings are no longer written into the report. The CSV and JSON exports remain complete and unfiltered for anyone who needs the full picture. - Per-check detail tables capped at 100 failed findings. Each check's detail table shows up to 100 failed findings, with an in-PDF banner reading "Showing first 100 of N failed findings" pointing readers to the CSV / JSON exports for the rest.
Read more in our compliance documentation.
🌊 New Provider: Scaleway (Unofficial, CLI-Only)
Prowler now scans Scaleway as a new provider. Point Prowler at your Scaleway organization with a secret key and start auditing IAM:
prowler scalewayThe release ships with the iam service and one check:
iam_api_keys_no_root_owned— flags Scaleway API keys bound to the account root user. Root-owned API keys bypass IAM policies and grant unrestricted access to every project, resource and billing setting in the organization; rotating them disrupts every automation that depended on root credentials, so they should be replaced with IAM-application-scoped keys.
Read more in our Scaleway provider documentation
⚙️ poetry → uv migration
Both the Prowler API and the Prowler SDK are now on uv as their package manager. Contributors get faster, deterministic installs and a single tool to work across the codebase.
Thank you to @AOrps for the contribution to migrate it in the API!
🆕 New Checks
AWS
cloudtrail_bedrock_logging_enabled— verifies at least one actively logging CloudTrail trail records Amazon Bedrock API activity for generative-AI auditability.iam_user_access_not_stale_to_sagemaker— flags IAM users whose last SageMaker access exceeds the configured threshold (default 90 days, tunable viamax_unused_sagemaker_access_days) or who have never accessed SageMaker.sagemaker_domain_sso_configured— verifies SageMaker Domains use IAM Identity Center (SSO) authentication instead of IAM users, so user access is centrally managed. Thanks to @kimjune01!
M365
entra_service_principal_no_secrets_for_permanent_tier0_roles— flags service principals that hold credentials for permanent Tier-0 role assignments (Global Admin, Privileged Role Admin, etc.), where any leaked secret is a tenant-wide compromise.
🔐 Security Updates
- UI:
npmdependencies updated to patched versions for Next.js, Vite, LangChain, XML parsing, lodash, and related transitive packages. - API: 4 HIGH severity dependency vulnerabilities resolved on
api/uv.lock—lxml5.3.2 → 6.1.0 (GHSA-vfmq-68hx-4jfw, XXE),urllib32.6.3 → 2.7.0 (GHSA-mf9v-mfxr-j63j, GHSA-qccp-gfcp-xxvc),microsoft-kiota-*1.9.2 → 1.9.9 (GHSA-7j59-v9qr-6fq9, viaoverride-dependenciessince the SDK hard-pinskiota-abstractions), andxmlsec1.3.14 → 1.3.17 for libxml2 compatibility with lxml 6.x (#11192). - MCP Server:
cryptography46.0.1 → 47.0.0 (transitive) for CVE-2026-39892, CVE-2026-26007 and CVE-2026-34073. - Supply chain tooling —
safetyreplaced withosv-scanner, which now also scans the UI workspace in addition to the SDK;npmsupply-chain hardening landed in the UI workspace; SDK root transitive dependencies pinned to prevent silent drift.
🙌 External Contributors
Thank you to our community contributors for this release!
- @AOrps — Replace
poetrywithuvas the Prowler API package manager in #10775 - @b-abderrahmane — Surface M365
AuditLog.Read.Allpermission errors as preventive per-user FAILs instead of mass false positives in #10907 - @kimjune01 — Add
sagemaker_domain_sso_configuredcheck for AWS provider in #11094
UI
🚀 Added
- Health endpoint at
GET /api/healthfor Docker Compose liveness checks (#11145) - AWS findings and resource details now expose a "View in AWS Console" link that opens the resource directly in the AWS Console via the universal
/go/viewARN resolver (#9172) - Lighthouse AI: Prowler App Finding Groups MCP tools (#11140)
🔄 Changed
- Trimmed unused
npmdependencies (#11115) - Faster, stricter pre-commit: prek lints and formats only staged UI files (husky removed), with Prettier and ESLint (
--max-warnings 40, stale-disable detection) now covering the full UI workspace, includi...
Prowler 5.26.1
UI
🐞 Fixed
- Role form Cancel buttons now return to Roles (#11125)
- Shared select dropdowns stay constrained and scrollable inside modals (#11125)
API
🐞 Fixed
POST /api/v1/scansCelery task is now published viatransaction.on_commitso the worker cannot read the Scan before the dispatch (#11122)
SDK
🐞 Fixed
entra_users_mfa_capableno longer flags disabled guest users by requestingaccountEnabledanduserTypefrom Microsoft Graph (#11002)
Prowler 5.26.0
✨ New features to highlight in this version
Enjoy them all now for free at https://cloud.prowler.com
🔔 Alerts
Note
Available exclusively in Prowler Cloud.
Wire findings straight into the people who need to know. By default, every organization gets a daily digest of critical findings delivered to the organization owner — auto-provisioned, no setup required, editable or removable any time.
From there, organization admins can define custom alert rules over scan results — scoped by provider, account, severity, status, or any combination — and route them to any user in the organization. A Create Alert shortcut on the Findings page turns the current filter set into an alert rule in one click, so the filters you used to triage become the alert that watches for the same condition tomorrow.
All organization users are confirmed recipients by default (no opt-in confirmation required for now), and every alert email carries a one-click unsubscribe link so nobody is stuck on a list they don't want to be on. The new Manage Alerts RBAC permission keeps configuration gated to the right people.
Read more in the alerts documentation.
🔍 Finding Detail Drawer - Built for Triage
The finding drawer is where security teams actually live during triage, so it has been rebuilt around the question every analyst opens it to answer: what's not good, where, and how do I fix it?
- The verdict comes first. A color-coded status banner sits at the top of the drawer - pass, fail, manual, or muted - so the outcome is the first thing you see, not the last thing you scroll to.
- Remediation gets its own tab. Step-by-step fixes no longer compete with identifiers and metadata for attention; you click one tab and you're in the "what do I do about it" view.
- Resource context is front and center. Account and Resource share the top row with a one-click link straight to the resource page.
- Information hierarchy matches the workflow. Internal identifiers (
check_id,finding_id,finding_uid) move to the bottom of the overview - still one click away when you need them for a Jira ticket or a copy-paste, but no longer competing with the answer to "what is this?". The "Other Findings For This Resource" tab is renamed to the more direct Findings for this resource. - Faster carousel navigation. Stepping through findings inside the drawer no longer flashes empty banners - the status renders immediately from the row you came from while the full record loads in the background.
The net effect: less hunting, fewer clicks between "I have a finding" and "I have a plan."
🎯 Prowler ThreatScore - Compliance View Overhaul
The ThreatScore compliance views get a focused UX pass so the score is something you can act on, not just look at:
- Canonical pillar ordering everywhere - pillars now render in a single canonical order (
1. IAM → 2. Attack Surface → 3. Logging and Monitoring → 4. Encryption) across the badge, breakdown card, donut legend, and accordion. Missing pillars no longer disappear from the UI - they render with-/ 0% so the full set is always visible. - Pillars are clickable - clicking a pillar on
/compliancenow jumps straight to the ThreatScore detail page with the accordion pre-expanded on the pillar you clicked, scrolled into view. No more eyeballing the accordion to find what you just clicked on. - Top Failed Sections always shows the full pillar set - every canonical pillar shows up on the chart, zero-filled when there are no failures, so you get a true at-a-glance pillar-by-pillar fail rate instead of a partial picture.
- Every donut slice is hoverable - on the Requirements Status donut, the slice you hover over expands slightly so even tiny 1–2% fail or manual segments are easy to target and inspect, instead of being swallowed by the dominant pass slice.
📚 ASD Essential Eight Maturity Model - AWS
The Australian Signals Directorate's Essential Eight Maturity Model (Maturity Level One, Nov 2023) is now a first-class compliance framework for AWS. It plugs into the compliance page with the same detail view, top-failed-sections breakdown, and export support as every other framework. Thanks to @boonchuan!
Read more in our compliance documentation.
📧 Google Workspace - Gmail Attachment Safety & Spoofing Protection
Eight new Gmail checks land for Google Workspace, covering attachment safety and spoofing protection at the domain level via the Cloud Identity Policy API:
gmail_anomalous_attachment_protection_enabledgmail_domain_spoofing_protection_enabledgmail_employee_name_spoofing_protection_enabledgmail_encrypted_attachment_protection_enabledgmail_groups_spoofing_protection_enabledgmail_inbound_domain_spoofing_protection_enabledgmail_script_attachment_protection_enabledgmail_unauthenticated_email_protection_enabled
Read more in our Google Workspace documentation.
Explore all Google Workspace checks at Prowler Hub.
☁️ AWS - Bedrock Hardening
Three new AWS Bedrock checks land this release to keep generative-AI surface area honest:
bedrock_guardrails_configured- flags Bedrock deployments that ship without Guardrails configured, the standard AWS-native abuse and content-safety layer.bedrock_prompt_management_exists- verifies Prompt Management is in use so prompts are versioned and auditable rather than embedded inline in application code.bedrock_prompt_encrypted_with_cmk- verifies that each Prompt is encrypted with CMK.
Read more in our AWS provider documentation.
Explore all AWS checks at Prowler Hub.
🖥️ UI - Providers Wording, Findings Polish
A coordinated UX pass across the high-traffic surfaces:
- Providers wording - "Cloud Providers", "Accounts", and "Account Groups" copy is gone. Everything is now consistently labeled "Providers" across the UI and docs, removing the last of the legacy naming.
- Finding remediation links - the detail drawer now labels remediation actions by destination ("View CVE", "View in Prowler Hub", "View Advisory", "View Reference") instead of a generic "View" everywhere.
- Compliance cards - full-width progress bar, passing-requirements caption next to the framework logo.
🔗 Remediation Links Now Point to the Source
Container image CVE findings and IaC findings now link to official sources for remediation and references - CVE.org, Prowler Hub, and GitHub Security Advisories - instead of a third-party advisory mirror. Trivy-sourced findings also link correctly into Prowler Hub, so the "View" buttons in the finding drawer go where you expect every time.
🔐 Security Updates
- Image provider SSRF - parser-mismatch SSRF in registry auth fixed: crafted bearer-token realms and pagination links could force requests to internal addresses and leak credentials cross-origin.
cryptography46.0.6 → 46.0.7 andtrivy0.69.2 → 0.70.0 across SDK, API, and MCP images for CVE-2026-39892 and CVE-2026-33186.requests2.33.1 in the MCP server image to clear advisory 90553.
🙌 External Contributors
Thank you to our community contributors for this release!
- @boonchuan - Add ASD Essential Eight Maturity Model compliance framework for AWS in #10808
- @DannyLyubenov - Batch AWS CodeBuild API calls to prevent throttling-induced false positives in #10639
- @davletd) - Tighten Azure Network Watcher flow log checks to require workspace-backed Traffic Analytics in #10645
- @davletd - Update Azure Network Watcher flow log compliance text for NSG retirement in #10937
- @ivan-necheporenko - Scan every Azure subscription even when display names collide in #10718
- @rchotacode - Scan Oracle Cloud identity in known valid regions for non-Ashburn tenancies in #10529
- @mohamedsolaiman - Add AWS guide for extending existing services in #10924
- @baggers27 - Fix Azure documentation broken link for minimum TLS version in #10916
UI
🚀 Added
- ASD Essential Eight compliance framework support (#11071)
🔄 Changed
Prowler 5.25.2
UI
🔄 Changed
- Compliance cards: progress bar now spans the full card width, the passing-requirements caption sits beside the framework logo under the title, and the ISO 27001 logo asset is recentered within its tile (#10939)
- Findings expanded resource rows now drop the redundant cube icons, render Service and Region with the same compact label style as Last seen and Failing for, and reorder columns to Status, Resource, Provider, Severity, then field labels (#10949)
SDK
🐞 Fixed
route53_dangling_ip_subdomain_takeovernow also flagsCNAMErecords pointing to S3 website endpoints whose buckets are missing from the account (#10920)- Duplicate Kubernetes RBAC findings when the same User or Group subject appeared in multiple ClusterRoleBindings (#10242)
- Match K8s RBAC rules by
apiGroup(#10969) - Return a compact actor name from CloudTrail
userIdentityevents (#10986)
Prowler 5.25.1
UI
🐞 Fixed
- Compliance page export menu now scales on small screens, and frameworks load on first render without requiring a manual scan re-selection (#10918)
API
🐞 Fixed
- Attack Paths: AWS scans no longer fail when enabled regions cannot be retrieved, and scans stuck in
scheduledstate are now cleaned up after the stale threshold (#10917) - Scan report and compliance downloads now redirect to a presigned S3 URL instead of streaming through the API worker, preventing gunicorn timeouts on large files (#10927)
SDK
🐞 Fixed
Prowler 5.25.0
✨ New features to highlight in this version
Enjoy them all now for free at https://cloud.prowler.com/
📦 Official Prowler GitHub Action
prowler-cloud/prowler@5.25 is now an official GitHub Action. Drop it into any workflow to run a Prowler scan, optionally upload SARIF to GitHub Code Scanning, and push results to Prowler Cloud.
- uses: prowler-cloud/prowler@5.25
with:
provider: iac
output-formats: sarif json-ocsf
upload-sarif: true
flags: --severity critical high
The action is pinned to the matching release tag, so v5.25 ships with prowler-cloud/prowler@5.25 ready to use.
🐙 GitHub — zizmor Workflow Scanning as a First-Class Service
The GitHub provider gains a new service: GitHub Actions, powered by zizmor for static analysis of workflow files. Prowler now scans .github/workflows/*.yml for the OWASP Top 10 CI/CD risks — script injection, overly permissive GITHUB_TOKEN, untrusted checkouts, dangerous triggers — and ships the findings through the same pipeline as every other GitHub check. This is your first line of defense against supply chain attacks: a poisoned action, a compromised tag, or a workflow that leaks secrets to a forked PR is exactly the kind of footgun zizmor catches before it ships. zizmor v1.24.1 is bundled into the API Docker image, so the service runs out of the box on Prowler Cloud and self-hosted alike.
Read more in our GitHub provider documentation.
Explore all GitHub checks at Prowler Hub.
🛡️ IaC — SARIF Output for GitHub Code Scanning
The IaC provider now emits SARIF via --output-formats sarif. Combined with the new GitHub Action, that means IaC misconfigurations land directly in the Security → Code Scanning tab on every PR — annotated on the offending Terraform, CloudFormation, Dockerfile, or Kubernetes manifest, with severity, remediation, and Prowler check metadata carried through.
Read more in our IaC provider documentation.
🖥️ UI — Compliance Page Redesign
The compliance page has been rebuilt: client-side search across frameworks, a more compact scan selector trigger, and redesigned compliance cards.
🖥️ UI — Resources, Mutelist, and Filter Polish
A coordinated UX pass across the high-traffic surfaces:
- Resources — batch-applied filters, syntax-highlighted metadata JSON, and tighter drawer behavior.
- Mutelist — name and reason search, plus visual count badges on finding targets.
- Shared filter dropdowns — local option search and auto-scroll to the first visible match across table and provider filters.
- View Resource button — easy navigation to resource details directly from finding view.
📧 Google Workspace — Gmail Service
The Google Workspace provider gains a new Gmail service with 9 CIS-aligned checks covering user settings, link safety, end-user access, and spam/phishing controls — pulled directly from the Cloud Identity Policy API at the domain level.
gmail_mail_delegation_disabledgmail_shortener_scanning_enabledgmail_external_image_scanning_enabledgmail_untrusted_link_warnings_enabledgmail_pop_imap_access_disabledgmail_auto_forwarding_disabledgmail_per_user_outbound_gateway_disabledgmail_enhanced_pre_delivery_scanning_enabledgmail_comprehensive_mail_storage_enabled
Explore all Google Workspace checks at Prowler Hub.
🏛️ Prowler Cloud — Reports for Imported Scans
Note
Available exclusively in Prowler Cloud.
Imported scans (OCSF) now generate the same downloadable artifacts as CLI scans. The new download buttons are wired into both the scans table and the compliance views, so air-gapped, partner, and offline OCSF imports get the same reporting surface as a connected provider.
Read more in our reports documentation.
📊 CIS Benchmark PDF Reports
Compliance for the latest CIS variant of every provider get a Download PDF button, and the API exposes the underlying generator at GET /scans/{id}/cis/{name}/. Only the latest CIS version per provider surfaces the button — the backend rejects PDF generation for older variants — so the report you download always matches the benchmark you'd want to ship to an auditor.
Read more in our compliance documentation.
👥 Tenant User Expulsion
Tenant owners can now remove users from their organizations directly from the UI. Behind the scenes, DELETE /tenants/{tenant_pk}/memberships/{id} deletes the expelled user's account when the removed membership was their last one and blacklists every outstanding refresh token, so existing sessions stop minting new access tokens immediately.
🔍 New Checks
AWS
secretsmanager_has_restrictive_resource_policy- evaluates resource-based policies for AWS Secrets Manager secrets — thanks to @kagahd!
GitHub
repository_default_branch_dismisses_stale_reviews— flags repositories whose default branch protection does not dismiss stale PR approvals when new commits are pushed (CIS 1.1.4) — thanks to @Mathisdjango!
Explore all GitHub checks at Prowler Hub.
🙌 External Contributors
Thank you to our community contributors for this release!
- @Mathisdjango -- New GitHub check: dismiss stale PR approvals on default branch (CIS 1.1.4) in #10569
- @raajheshkannaa --
--repo-list-fileCLI flag for GitHub provider to load repositories from a file in #10501 - @grauJavier -- Centralize AI assistant config via symlinks for skills in #9951
- @boonchuan -- Nginx reverse proxy configuration in #10780
- @kagahd -- New AWS check to evaluate resource-based policies for Secrets Manager secrets in #6985
UI
🚀 Added
- Download PDF button for CIS Benchmark compliance cards, surfaced only on the latest CIS variant per provider to match the backend's latest-only PDF generation (#10650)
knipfor dead code detection withlint:knipandlint:knip:fixscripts (#10654)- Resource button in the findings resource detail drawer to open the related resource page (#10847)
🔄 Changed
- Redesign compliance page, client-side search for compliance frameworks, compact scan selector trigger, enhanced compliance cards (#10767)
- Allows tenant owners to expel users from their organizations (#10787)
- Shared filter dropdowns now support local option search and auto-scroll to the first visible match across table and provider filters (#10859)
- Backward-compatibility middleware redirect from
/sign-up?invitation_token=…to/invitation/accept?invitation_token=…; new invitation emails use/invitation/acceptdirectly (#10797) - Mutelist improvements: table now supports name/reason search and visual count badges for finding targets (#10846)
- Resources now use batch-applied filters, render metadata JSON with syntax highlighting, and more (#10861)
- Table pagination controls now keep their arrows visible on hover in light theme, and more UI improvements (#10862)
API
🚀 Added
- CIS Benchmark PDF report generation for scans, exposing the latest CIS version per provider via
GET /scans/{id}/cis/{name}/(#10650) /overviews/resource-groups(resource inventory),/overviews/categoriesand/overviews/attack-surfacesnow reflect newly-muted findings without waiting for the next scan. The post-mutereaggregate-all-finding-group-summariestask now also dispatchesaggregate_scan_resource_group_summaries_task,aggregate_scan_category_summaries_taskandaggregate_attack_surface_taskper latest scan of every(provider, day)pair, rebuildingScanGroupSummary,ScanCategorySummaryandAttackSurfaceOverviewalongside the tables already covered in #10827 (#10843)- Install zizmor v1.24.1 in API Docker image for GitHub Actions workflow scanning (#10607)
🔄 Changed
- Allows tenant owners to expel users from their organizations (#10787)
aggregate_findings,aggregate_attack_surface,aggregate_scan_resource_group_summariesandaggregate_scan_category_summariesnow upsert viabulk_create(update_conflicts=True, ...)instead of the priorignore_conflicts=True/ plain INSERT /already backfilledshort-circu...
Prowler 5.24.4
UI
🐞 Fixed
- Provider wizard no longer advances to the Launch Scan step when rotating credentials (#10851)
- Attack Paths scan selector now lists scans from every provider with working pagination, instead of capping the list at the first ten (#10864)
API
🚀 Added
DJANGO_SENTRY_TRACES_SAMPLE_RATEenv var (default0.02) enables Sentry performance tracing for the API (#10873)
🔄 Changed
- Attack Paths: Neo4j driver
connection_acquisition_timeoutis now configurable viaNEO4J_CONN_ACQUISITION_TIMEOUT(default lowered from 120 s to 15 s) (#10873)
Prowler 5.24.3
API
🚀 Added
/overviews/findings,/overviews/findings-severityand/overviews/servicesnow reflect newly-muted findings without waiting for the next scan. The post-mutereaggregate-all-finding-group-summariestask was extended to re-run the same per-scan pipeline that scan completion runs (ScanSummary,DailySeveritySummary,FindingGroupDailySummary) on the latest scan of every(provider, day)pair, keeping the pre-aggregated tables in sync withFinding.mutedupdates (#10827)
🐞 Fixed
- Finding groups aggregated
statusnow treats muted findings as resolved: a group isFAILonly while at least one non-muted FAIL remains, otherwise it isPASS(including fully-muted groups). Thefilter[status]filter and thesort=statusordering share the same semantics, keepingstatusconsistent withfail_countand the orthogonalmutedflag (#10825) aggregate_findingsis now idempotent: it deletes the scan's existingScanSummaryrows beforebulk_create, so re-runs (such as the post-mute reaggregation pipeline) no longer violate theunique_scan_summaryconstraint and no longer abort the downstreamDailySeveritySummary/FindingGroupDailySummaryrecomputation for the affected scan (#10827)- Attack Paths: Findings on AWS were silently dropped during the Neo4j merge for resources whose Cartography node is keyed by a short identifier (e.g. EC2 instances) rather than the full ARN (#10839)