
Research
/Security News
Critical Vulnerability in NestJS Devtools: Localhost RCE via Sandbox Escape
A flawed sandbox in @nestjs/devtools-integration lets attackers run code on your machine via CSRF, leading to full Remote Code Execution (RCE).
This is a CLI application to switch your role using autocompletion by parsing your config/credential file and set environment variables
This is a CLI application makes it easier to switch roles using auto completion from parsing your aws config/credential file and setting "AWS_SECRET_ACCESS_KEY", "AWS_ACCESS_KEY_ID", "AWS_SESSION_TOKEN", "AWS_SECURITY_TOKEN"
environment variables if present.
This script does not support MFA roles, and designed to help cycle through profiles set manually, or as output from an SSO script like: https://github.com/Nike-Inc/gimme-aws-creds
python3 -m pip install -U aws_role_switcher
In order to work properly this script must be sourced, add the following to your .profile or .bashrc( you can adjust the alias name to whatever you want)
alias ars='source aws-role-switcher.sh'
Note: You can run this from the command line using . aws-role-switcher.sh
or source aws-role-switcher.sh
.
You can set the following environmental variables:
AWS_PROFILE_SWITCHER_PATH
- Override the default credential/config file location from $HOME/.aws/credentials
I would recommend adding to your ~/.profile or ~/.bash_profile
ars
to start prompt. TAB or start typing to start auto completion list. TAB or use arrows to cycle through list, and enter to select.
using a format of <script> <profile_arg> <region_arg>
the utility will start the prompt process with the passed in args
i.e
ars admin uswest2
Example config file:
[default]
aws_access_key_id = REDACTED
aws_secret_access_key = redacted
aws_session_token = default
aws_security_token = default
[testing-administrator]
aws_access_key_id = REDACTED
aws_secret_access_key = redacted
aws_session_token = testing
aws_security_token = testing
[staging-administrator]
aws_access_key_id = REDACTED
aws_secret_access_key = redacted
aws_session_token = staging
aws_security_token = staging
[production-administrator]
aws_access_key_id = REDACTED
aws_secret_access_key = redacted
aws_session_token = production
aws_security_token = production
Example Usage:
Updated Example (1.5.0):
Please use the submit a issue to report any bugs or file feature requests.
If you are interested in being a contributor and want to get involved in developing this CLI application feel free to reach out
In general, PRs are welcome. We follow the typical trunk based development Git workflow.
NOTE: Be sure to merge the latest changes from "upstream" before making a pull request!
FAQs
This is a CLI application to switch your role using autocompletion by parsing your config/credential file and set environment variables
We found that aws-role-switcher demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
A flawed sandbox in @nestjs/devtools-integration lets attackers run code on your machine via CSRF, leading to full Remote Code Execution (RCE).
Product
Customize license detection with Socket’s new license overlays: gain control, reduce noise, and handle edge cases with precision.
Product
Socket now supports Rust and Cargo, offering package search for all users and experimental SBOM generation for enterprise projects.