Attack Path Analysis

We continuously map paths from internet-exposed entry points through lateral movement opportunities to your critical assets.

subimage / attack-paths
Internet Exposure
Load balancer goodenough-lb-3331738.us-east-1.elb.amazonaws.com+10 exposes container cloudwatch-agent+50 to the internet
Vulnerability Exploitation
Vulnerability CVE-2026-29786+18 in the image of container goodenough-frontend+4 can be exploited to gain code execution

A HIGH or CRITICAL severity CVE in a container image may allow an attacker with network access to exploit the vulnerability and gain code execution inside the container.

Identity Usage
Task definition goodenough-frontend+4 grants IAM role goodenough-readonly+4 to any code executing in the container

Code executing inside an ECS container inherits the cloud permissions of any IAM role assigned by its task definition, including both task roles and execution roles.

Exfiltration
IAM role goodenough-readonly+4 can write data to S3 bucket goodenough-prod-storage+5 in goodenoughlabs-prod+5

An IAM role with s3:PutObject permission can upload or overwrite objects in a bucket, enabling data tampering or malware staging.

screenshot

What-if scenario modeling

Model and trace any node's blast radius in response to potential compromise.

screenshot

Remediation that breaks the chain

Each path shows you the cheapest fix — the single change that severs the path entirely. Fix one thing, eliminate an entire class of attack.

screenshot

Crown jewel mapping

Tag your most critical assets — production databases, secrets managers, CI/CD pipelines — and we prioritize every path that reaches them.