VISTA: Building an AWS Security Scanner That Validates Exploitability, Not Just Compliance
Hook
Most AWS security scanners generate hundreds of findings. VISTA asks a better question: which vulnerabilities can actually be exploited?
Context
Traditional AWS security tools excel at detecting misconfigurations—a missing MFA device here, an overly permissive security group there—but they struggle with context. A user without MFA might be dormant. An open security group might protect a honeypot. The result? Security teams drowning in findings they can’t prioritize.
VISTA (Vulnerability Inspection & Security Tracking for AWS) takes a different approach. Rather than simply cataloging potential issues, it validates whether detected vulnerabilities are exploitable in practice. Built entirely on serverless AWS infrastructure, VISTA combines read-only IAM scanning with intelligent analysis to separate signal from noise. It focuses on helping teams understand which IAM and security issues actually matter.
Technical Insight
VISTA’s architecture demonstrates how far you can push serverless AWS services for security tooling. The frontend is a static site hosted on S3—HTML, CSS, and vanilla JavaScript with Chart.js for visualization and Bootstrap for responsive design. Amazon Cognito handles authentication, keeping the credential surface area minimal. Users never interact directly with backend services; everything routes through API Gateway.
The interesting work happens in three Lambda functions. The aws-redteam-scanner function orchestrates the core scanning workflow. When you provide AWS credentials via the dashboard, this function assumes read-only permissions to enumerate IAM users, access keys, password policies, and security group configurations. The critical insight here is the permission model: VISTA uses precisely scoped IAM permissions like iam:GetLoginProfile, iam:ListMFADevices, and iam:GetAccessKeyLastUsed to assess security posture without requiring write access to anything. This makes it safe to run in production environments—you’re not granting keys to the kingdom, just a read-only viewfinder.
What sets VISTA apart is its validation approach. Rather than applying static rules, the scanner processes findings through a LangGraph workflow to determine actual exploitability. The README indicates findings are validated to determine if they’re “Exploitable” or “Not Exploitable in Practice,” with validation evidence stored in DynamoDB alongside each finding. Each finding includes validation status, detailed remediation steps, and potential impact assessment.
The asynchronous processing model is worth understanding. When you click “Schedule Security Assessment,” the API Gateway triggers aws-redteam-scanner, which immediately returns a scan ID formatted as scan-YYYYMMDD-HHMMSS. The actual scanning happens in the background—Lambda crunches through your IAM configuration, runs validation analysis, and persists results to DynamoDB. You navigate to the “Previous Scans” page, where the aws-redteam-listscan function queries DynamoDB for scan history. Once your scan shows “completed” status, clicking “View” calls aws-redteam-get-results to fetch the full finding set.
This architecture accommodates Lambda’s computation limitations while keeping the user experience straightforward. The dashboard visualizes findings with a pie chart breaking down severity distribution and a table showing top vulnerabilities by type. Each finding includes not just what’s wrong, but validation status, step-by-step remediation instructions, and potential impact assessment.
The IAM permission strategy reveals careful thought about scope. VISTA’s Lambda role includes permissions like iam:ListUsers, iam:ListAccessKeys, iam:GetAccountPasswordPolicy, and similar read-only operations. The README states the tool can identify “IAM misconfigurations (e.g., users without MFA), security group vulnerabilities (e.g., overly permissive rules), public exposure of sensitive resources, and excessive permissions,” though the detailed IAM permissions list focuses primarily on user assessment capabilities.
Gotcha
VISTA’s scope is focused but the README doesn’t fully detail its boundaries. The tool explicitly lists comprehensive IAM user assessment permissions but is less specific about other service coverage. While it mentions identifying “security group vulnerabilities” and “public exposure of sensitive resources,” the detailed permission list focuses on IAM operations. For organizations needing broad coverage across AWS services, you’ll want to evaluate what VISTA actually scans versus what you need.
The asynchronous scan model creates inherent friction. Unlike tools that provide real-time feedback, VISTA requires you to initiate a scan, navigate away, then return to the Previous Scans page to check results. The README notes this explicitly: “Due to Lambda computation limitations, results cannot be viewed in real-time.” There’s no indication of notifications when scanning completes or webhook integration for streaming findings as they’re discovered. The README also doesn’t document any automated remediation capabilities—you get detailed manual instructions, but you’re implementing fixes yourself.
With only 2 GitHub stars and no repository description, VISTA appears to be an early-stage or personal project. The README is comprehensive about architecture and features but doesn’t include installation instructions, deployment guides, or information about development status.
Verdict
Use VISTA if you need lightweight IAM security scanning with exploitability validation, you’re already deep in the AWS ecosystem and want serverless infrastructure for your security tools, or you’re learning how to build security assessment platforms and want a clean reference architecture. The validation approach aims to reduce false positives, helping you understand and act on findings that matter. Consider VISTA if you require real-time scan feedback or need to verify its exact scope matches your requirements before deployment. The asynchronous processing model and focus on specific AWS services may not fit every use case. With limited community adoption (2 GitHub stars) and no installation documentation in the README, expect to invest time understanding the deployment process. VISTA works best as a focused scanner for IAM security reviews or as educational infrastructure for understanding serverless security tooling patterns.