NHI Security Platform — 10 finding types, proprietary Policy Intelligence Engine™, and Terraform fix PRs. Get from zero to first IAM fix in under 10 minutes.
TrustFix uses a read-only cross-account IAM role to scan your AWS account. Create it with the following trust policy, replacing TRUSTFIX_ACCOUNT_ID and YOUR_EXTERNAL_ID with the values shown in your TrustFix dashboard.
Attach an IAM policy with the minimum required permissions: iam:ListRoles, iam:GetRole, iam:GetRolePolicy, iam:ListRolePolicies, iam:ListAttachedRolePolicies. TrustFix never writes to your AWS account.
Add the TrustFix scanner to your existing CI workflow or create a dedicated security scan file. This runs on every push and PR.
Add TRUSTFIX_ROLE_ARN as a GitHub Actions secret with the ARN of the IAM role you created in Step 1.
After signing in to TrustFix:
Your first scan runs automatically when you connect your AWS account. Findings appear within 60 seconds. Critical issues are highlighted in red with severity ratings. Pro and Team plans include on-demand rescanning via the Scan Now button.
TrustFix is designed with a least-privilege, read-only security model. Here is exactly what access we require and why.
TrustFix assumes a role in your AWS account using STS AssumeRole with a unique External ID. The External ID prevents confused deputy attacks — only TrustFix, from our specific AWS account, can assume your role even if an attacker knows your role ARN.
The role requires only the following four permissions — nothing more:
TrustFix never modifies your AWS environment. All fix recommendations are delivered as GitHub Pull Requests that require human review and approval before anything changes. There is no automated remediation that touches AWS directly.
Every scan uses fresh temporary credentials obtained via STS AssumeRole. These credentials expire automatically and are never stored to disk or logged. TrustFix never stores AWS access keys or secret keys of any kind.
TrustFix currently detects the following OIDC trust policy misconfigurations:
| # | Detector | What It Detects | Severity |
|---|---|---|---|
| 1 | Missing Sub Condition | Trust policy has no sub condition — any repo can assume the role | CRITICAL |
| 2 | Overly Broad Trust | Sub condition uses StringLike with wildcards — matches all repos | CRITICAL |
| 3 | Missing Audience Condition | No aud condition — tokens from any OIDC client accepted | HIGH |
| 4 | Fork PR Risk | Hardcoded role ARN + pull_request trigger — exploitable via fork | HIGH |
| 5 | Wildcard Environment | Environment condition too broad or missing | HIGH |
| 6 | Expired OIDC Provider | No role activity for 90+ days — likely orphaned | MEDIUM |
| 7 | Overprivileged CI/CD Role | Permissions beyond what CI/CD needs | HIGH |
| 8 | Admin Access in CI/CD | AdministratorAccess on CI/CD role | CRITICAL |
| 9 | AI Agent Overprivileged | AI agent identity with overly broad permissions | CRITICAL |
| 10 | AI Agent Missing Scope | AI agent missing scope restriction | HIGH |
Run TrustFix's OIDC scanner locally — no account required. The CLI scans your AWS account's IAM roles for OIDC misconfigurations and outputs findings in JSON or human-readable format.
Also available as a GitHub Actions step — scan on every push and PR automatically. View on GitHub Marketplace →
No. TrustFix uses a read-only cross-account IAM role (with ReadOnlyAccess policy) to scan your account. All fix recommendations are delivered as GitHub Pull Requests that require human review and approval before anything changes in your infrastructure. TrustFix never auto-applies changes.
No. TrustFix never stores AWS access keys or secret keys. All AWS access is via temporary STS credentials obtained by assuming your cross-account IAM role. These credentials expire automatically and are never written to disk.
TrustFix generates fixes for the AWS provider (hashicorp/aws) version 4.x and above. Generated Terraform uses the aws_iam_role resource with a trust policy document. If you use a different IaC tool (CDK, CloudFormation, Pulumi), you can still use the JSON trust policy shown in each finding to apply the fix manually.
When you request a fix, TrustFix sends the specific IAM trust policy and finding details to an AI service. The AI analyzes the trust relationship, identifies the exact misconfiguration, and generates a least-privilege Terraform patch. The generated code targets only the affected condition block — it does not rewrite unrelated parts of your IAM role.
Free tier includes 1 AWS account with initial scan. Unlimited CLI & GitHub Action scanning.