
Security News
The Hidden Blast Radius of the Axios Compromise
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.
Simple command utility to help you manage and switch between multiple AWS CLI users. use aws-user --help for usage information.
This is a simple command utility to mange and switch between multiple AWS users.
Use aws-user help to get all available commands.
Can be helpful if you have more than one user with diffrent permissions, or users in multiple organizations.
The storage is done localy in the same place where aws credentials are stored, you need to have AWS CLI installed as it assumes the credentials folder exists.
Note:
yarn global add aws-user
Get commands:
aws-user help
Add User:
aws-user add <user>:<access-key>:<secret-key>
Example:
aws-user add john22:ASIARNQFX7RWNRAAI2VVO:TTgFyl0p/2kxXa/uJ9i9sabBn22b2sewLXjaXPPY
It has commands to switch between users, add users, remove users, wipe local storage, list all users, and loggout from AWS.
Example of using aws-user comand util

Issues and pull requests are welcome.
MIT
FAQs
Simple command utility to help you manage and switch between multiple AWS CLI users. use aws-user --help for usage information.
The npm package aws-user receives a total of 3 weekly downloads. As such, aws-user popularity was classified as not popular.
We found that aws-user demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.