fix(deps): update toniblyx/prowler docker tag to v5.12.2 #76
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Note
Mend has cancelled the proposed renaming of the Renovate GitHub app being renamed to
mend[bot]
.This notice will be removed on 2025-10-07.
This PR contains the following updates:
5.2.0
->5.12.2
Release Notes
prowler-cloud/prowler (toniblyx/prowler)
v5.12.2
: Prowler 5.12.2Compare Source
UI
🐞 Fixed
API
🔄 Changed
compliance
(#8755)🔒 Security
v5.12.1
: Prowler 5.12.1Compare Source
UI
🐞 Fixed
SDK
🐞 Fixed
firehose_stream_encrypted_at_rest
check false positives and new api call in kafka service (#8599)v5.12.0
: Prowler 5.12.0Compare Source
New features to highlight in this version
🛠️ JIRA Integration: Streamlined Issue Management
You can now send findings directly from Prowler into your JIRA projects. This integration helps security and engineering teams work in the same place where issues are tracked and resolved.
jira.integration.mov
This feature bridges the gap between security and development, keeping everyone on the same page.
📊 Findings Overview API: Filter by Status
The
GET /overviews/findings_severity
endpoint now supports filtering by status. This enhancement allows you to refine aggregated results by specific outcomes like FAIL or PASS.🔒 Token API Throttling
We've introduced throttling support for the token endpoint, giving you greater control over authentication traffic.
Big thanks to @josemazo for joining the Prowler team and contributing to making cloud security even better! 🚀
⚡️ MongoDB Atlas Provider (Beta)
We're excited to announce that Prowler now includes MongoDB Atlas as a supported provider!
We added support in the CLI with 10 checks to scan Clusters, Projets and Organizations:
clusters_authentication_enabled
- Ensure clusters have authentication enabledclusters_backup_enabled
- Ensure clusters have backup enabledclusters_encryption_at_rest_enabled
- Ensure clusters have encryption at rest enabledclusters_tls_enabled
- Ensure clusters have TLS authentication requiredorganizations_api_access_list_required
- Ensure organization requires API access listorganizations_mfa_required
- Ensure organization requires MFAorganizations_security_contact_defined
- Ensure organization has security contact definedorganizations_service_account_secrets_expiration
- Ensure organization has maximum period expiration for service account secretsprojects_auditing_enabled
- Ensure database auditing is enabledprojects_network_access_list_exposed_to_internet
- Ensure project network access list is not exposed to internetThis addition strengthens Prowler's position as the go-to multi-cloud security tool, now covering AWS, Azure, GCP, Kubernetes, Microsoft 365, GitHub, and MongoDB Atlas.
UI
🚀 Added
🔄 Changed
status=FAIL
) and chart links open the Findings page pre-filtered to fails per severity (#8186)🐞 Fixed
API
🚀 Added
GET /overviews/findings_severity
now supportsfilter[status]
andfilter[status__in]
to aggregate by specific statuses (FAIL
,PASS
)(#8186)/api/v1/tokens
using theDJANGO_THROTTLE_TOKEN_OBTAIN
environment variable (#8647)SDK
🚀 Added
AdditionalUrls
field in CheckMetadata (#8590)--excluded-checks-file
flag (#8301)clusters_authentication_enabled
- Ensure clusters have authentication enabledclusters_backup_enabled
- Ensure clusters have backup enabledclusters_encryption_at_rest_enabled
- Ensure clusters have encryption at rest enabledclusters_tls_enabled
- Ensure clusters have TLS authentication requiredorganizations_api_access_list_required
- Ensure organization requires API access listorganizations_mfa_required
- Ensure organization requires MFAorganizations_security_contact_defined
- Ensure organization has security contact definedorganizations_service_account_secrets_expiration
- Ensure organization has maximum period expiration for service account secretsprojects_auditing_enabled
- Ensure database auditing is enabledprojects_network_access_list_exposed_to_internet
- Ensure project network access list is not exposed to internet🔄 Changed
ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_*
(#8293)🐞 Fixed
AdditionalUrls
toAdditionalURLs
field in CheckMetadata (#8639)v5.11.0
: Prowler 5.11.0Compare Source
New features to highlight in this version
🔒 AWS Security Hub Integration: Centralized Management of Prowler Findings
We are pleased to announce the integration of Prowler with AWS Security Hub, enabling you to seamlessly send your security findings directly to Security Hub for centralized administration and enhanced visibility.
Take advantage of the new AWS Security Hub integration to streamline your security operations and improve the efficiency of your cloud security posture management.
💡 Lighthouse AI now supports OpenAI GPT-5
We've added support for OpenAI GPT-5 in Lighthouse AI — unlocking enhanced AI-driven analysis, faster results, and broader compatibility for your automated workflows.
⛓️💥 Better AWS IAM Privilege Escalation Coverage
Following the latest research, we updated our privilege escalation checks to cover newly discovered patterns and reduce false positives.
✅ New Checks
We’ve introduced 4 new security checks to enhance your Cloud posture.
AWS
eks_cluster_deletion_protection_enabled
- Detect EKS clusters without deletion protection enabled.Azure
apim_threat_detection_llm_jacking
- Monitors 25+ LLM API endpoints across major AI providers.vm_sufficient_daily_backup_retention_period
- Ensures that all VMs have a daily backup policy with a retention period meeting or exceeding the configured minimum.vm_jit_access_enabled
- Ensures that all VMs are configured to use Just-in-Time (JIT) access, reducing the attack surface for management ports.UI
🚀 Added
Cloud Provider
type filter to providers page (#8473)🔄 Changed
See Compliance
button until scan completes (#8487)🐞 Fixed
API
Added
Fixed
SDK
Added
vm_sufficient_daily_backup_retention_period
check for Azure provider (#8200)vm_jit_access_enabled
check for Azure provider (#8202)eks_cluster_deletion_protection_enabled
check for AWS provider (#8536)cloudtrail_threat_detection_enumeration
check (#8557)apim_threat_detection_llm_jacking
check for Azure provider (#8571)--skip-api-check
command line flag (#8575)Changed
Fixed
s3_bucket_shadow_resource_vulnerability
check (#8572)entra_users_mfa_capable
check (#8544)user:email
scope (#8580)v5.10.2
: Prowler 5.10.2Compare Source
SDK
🐞 Fixed
app_http_logs_enabled
check false positives (#8507)storage_geo_redundant_enabled
check false positives (#8504)kafka_cluster_is_public
check false positives (#8514)v5.10.1
: Prowler 5.10.1Compare Source
UI
🐞 Fixed
Assume Role
in AWS role credentials form shown again (#8484)GitHub
submenu to High Risk Findings (#8488)Findings by Severity
spacing (#8491)SDK
🐞 Fixed
v5.10.0
: Prowler 5.10.0Compare Source
New features to highlight in this version
🗂️ Amazon S3 Integration
We're excited to introduce seamless integration with Amazon S3, giving you full control over where your scan reports are delivered. With this new feature, automatically send scan reports to any configured S3 bucket.
Start leveraging the power of Amazon S3 integration today and make report management simpler and more adaptable than ever before.
📄 GitHub Provider
Prowler App now supports GitHub as cloud provider, enabling you to assess the security posture of your GitHub organization and repositories with ease.
This integration brings GitHub into the same powerful security framework you already use with AWS, Azure, and other providers—helping you stay secure across all your environments.
Start scanning your GitHub environment today to gain full visibility and actionable insights.
Scopped Scannings - CLI-Only
We’ve added support for repository and organization scoping in the GitHub provider to enable more targeted security assessments.
Instead of scanning all accessible repositories and organizations, you can now define exactly what to scan using two new CLI flags:
--repository
— Specify one or more repositories to scan, e.g.:--repository acme/app acme/lib
--organization
— Limit scans to specific organizations, e.g.:--organization acme-org other-org
These can also be combined to narrow the scope even further. This update makes it easier to audit specific parts of your GitHub footprint—particularly useful for large organizations or multi-team environments.
🔦 Lighthouse Improvements: Enhanced Insights + New Banner
We've made several improvements to Lighthouse:
✅ New Checks
We’ve introduced 5 new security checks to enhance your Cloud posture.
AWS
bedrock_api_key_no_administrative_privileges
— Ensures Bedrock API keys don’t have excessive permissions.bedrock_api_key_no_long_term_credentials
— Detects long-lived credentials in Bedrock API keys.s3_bucket_shadow_resource_vulnerability
— Flags shadow resources in S3 buckets that may introduce risk.Azure
vm_desired_sku_size
— Validates that VMs are configured with the desired SKU size.vm_scaleset_not_empty
— Ensures VM Scale Sets are not empty, reducing configuration drift.📘 Compliance Update
Prowler now supports the CIS Microsoft Azure Foundations Benchmark v4.0, bringing your compliance checks in line with the latest industry best practices for securing Azure environments.
UI
🚀 Added
🔄 Changed
Memberships
toOrganization
in the sidebar (#8415)🐞 Fixed
❌ Removed
Browse all resources
from the sidebar, sidebar now shows a singleResources
entry (#8418)Misconfigurations
from theTop Failed Findings
section in the sidebar (#8426)API
🚀 Added
🐞 Fixed
SDK
🚀 Added
bedrock_api_key_no_administrative_privileges
check for AWS provider (#8321)bedrock_api_key_no_long_term_credentials
check for AWS provider (#8396)vm_desired_sku_size
check for Azure provider (#8191)vm_scaleset_not_empty
check for Azure provider (#8192)--repository/respositories
and--organization/organizations
flags (#8329)s3_bucket_shadow_resource_vulnerability
check for AWS provider (#8398)🔄 Changed
checkov
python library (#8385)🐞 Fixed
set_identity
andset_session_config
methods in AwsProvider (#8056)role_session_name
andsession_duration
in AwsSetUpSession (#8056)role_session_name
andsession_duration
in S3 (#8417)test_connection
uses AWS S3 APIHeadBucket
instead ofGetBucketLocation
(#8456)sns_topics_not_publicly_accessible
false positive withaws:SourceArn
conditions (#8326)kisa_isms_p_2023_aws
table (#8382)setup_assumed_session
static for the AWS provider (#8419)v5.9.2
: Prowler 5.9.2Compare Source
API
Changed
SDK
Fixed
defender_domain_dkim_enabled
check (#8334)v5.9.1
: Prowler 5.9.1Compare Source
API
Fixed
Full Changelog: prowler-cloud/prowler@5.9.0...5.9.1
v5.9.0
: Prowler 5.9.0Compare Source
New features to highlight in this version
🔇 Mutelist Support
Easily mute findings through a flexible and fully configurable setup.
🔐 Single Sign-On (SSO) with SAML: Seamless and Secure Access
We are pleased to introduce Single Sign-On (SSO) with SAML, a significant step forward in making your authentication experience both smoother and more secure. With SAML-based SSO, you can now log in to Prowler using your organization's identity provider, such as Okta, without needing to remember another set of credentials.
To get started, look for the new "Sign in with SSO" option on the login page. For detailed configuration instructions, please refer to the "SSO with SAML" section in our documentation.
🧩 Resource View: A unified overview of your assets
Introducing a brand-new Resource View, a central place to explore and understand your resources in depth.
⚡️ Smoother, Faster Experience
We've made several improvements behind the scenes to make Prowler feel faster and more responsive.
🔒 Enhanced Password Security
We've improved account security by introducing stronger password requirements. Passwords must now be at least 12 characters long and include a mix of uppercase letters, lowercase letters, numbers, and special characters. A real-time strength indicator helps users meet these criteria as they type, ensuring more secure account creation. These enhancements align with best practices to better protect user data and prevent unauthorized access.
✅ New Checks!
We've added 8 new security checks across multiple cloud providers and services to help you stay ahead of evolving risks:
entra_intune_enrollment_sign_in_frequency_every_time
for M365.storage_smb_channel_encryption_with_secure_algorithm
storage_smb_protocol_version_is_latest
vm_backup_enabled
vm_linux_enforce_ssh_authentication
vm_ensure_using_approved_images
vm_scaleset_associated_load_balancer
defender_attack_path_notifications_properly_configured
🛠️ IaC Provider now supports remote Git repositories
The IaC provider just got more powerful! You can now scan Infrastructure-as-Code files directly from remote Git repositories.
UI
🚀 Added
🔒 Security
🔄 Changed
🐞 Fixed
API
🚀 Added
GET /resources/metadata
,GET /resources/metadata/latest
andGET /resources/latest
to expose resource metadata and latest scan results (#8112)🔄 Changed
/processors
endpoints to post-process findings. Currently, only the Mutelist processor is supported to allow to mute findings.POST /schedules/daily
returns a409 CONFLICT
if already created (#8258)🐞 Fixed
GET /overviews/providers
(#8277)🔒 Security
SDK
🚀 Added
storage_smb_channel_encryption_with_secure_algorithm
check for Azure provider (#8123)storage_smb_protocol_version_is_latest
check for Azure provider (#8128)vm_backup_enabled
check for Azure provider (#8182)vm_linux_enforce_ssh_authentication
check for Azure provider (#8149)vm_ensure_using_approved_images
check for Azure provider (#8168)vm_scaleset_associated_load_balancer
check for Azure provider (#8181)defender_attack_path_notifications_properly_configured
check for Azure provider (#8245)entra_intune_enrollment_sign_in_frequency_every_time
check for M365 provider (#8223)test_connection
method to GitHub provider (#8248)🔄 Changed
🐞 Fixed
iam_user_accesskey_unused
check for AWS provider (#8233)m365_identity_type
andm365_identity_id
in cloud reports (#8247)is_service_role
only returnsTrue
for service roles (#8274)ServiceName
field in Network Firewall checks metadata (#8280)entra_users_mfa_capable
check to use the correct resource name and ID (#8288)tenant_id
for M365 Mutelist (#8306)v5.8.1
: Prowler 5.8.1Compare Source
UI
🔄 Changed
GET /findings/latest
(#8219)🗑️ Removed
API
🚀 Added
🔄 Changed
🐞 Fixed
🗑️ Removed
SDK
🐞 Fixed
firehose_stream_encrypted_at_rest
logic (#8213)Full Changelog: prowler-cloud/prowler@5.8.0...5.8.1
v5.8.0
: Prowler 5.8.0Compare Source
New features to highlight in this version
📘 Detailed Views for All Supported Compliance Standards
You asked for more clarity—we delivered. Now every supported compliance framework (like ENS-RD2022, CIS, ISO, NIST, etc.) includes a fully detailed view to help your team understand, prioritize, and act faster.
🔍 What’s New:
Now live across all frameworks in your Compliance tab!
🤖 Introducing Prowler Lighthouse — Your AI Cloud Security Analyst
Say hello to Prowler Lighthouse, your always-on, AI-powered cloud security assistant.
Designed for teams with or without dedicated security resources, Lighthouse helps you:
⚙️ Customizable & Secure
In the Lighthouse Configuration Panel, you can:
It not only summarizes your security posture but also highlights where to focus your attention.
Now available in the Lighthouse tab. Start chatting today!
🚀 User Profile
We've revamped the User Profile interface to provide a cleaner, more actionable view of your account:
✨ Try it out by visiting your Profile page and experience the streamlined design!
📌 Affected Resource Name in Findings
Quickly pinpoint misconfigurations with the new "Resource name" column in the findings table!
🔐 GCP Service Account Key Authentication
You can now connect your Google Cloud Platform account by simply pasting your Service Account Key JSON.
This makes it easier than ever to authenticate and start scanning your GCP environment.
🔑 M365 Authentication App-Only (Service Principal) Authentication
Prowler now supports Microsoft 365 app-only (service principal) authentication via OAuth 2.0 client-credentials: just register an Azure AD app, grant it the necessary application-level permissions, grant admin consent, and supply your tenant ID, client ID and secret.
This lets Prowler run fully unattended scans against Exchange Online, SharePoint, Teams, etc., simplifies CI/CD integration and enforces least-privilege access.
🙌 Special thanks to @silverhack for their support and guidance in resolving key Microsoft 365 authentication issues.
Your contributions help make Prowler stronger for everyone! 💜
🆕 Checks
We’ve added 21 new security checks across multiple cloud providers and services to help you stay ahead of evolving risks:
🧪 Run a scan now to see how your environment stacks up!
🛡️ Baseline NIS 2 Compliance
We’ve added baseline NIS 2 compliance support for AWS, Azure, and GCP, aligning with the EU 2022/2555 directive annex.
This update includes:
Start assessing your NIS 2 readiness directly from the Compliance tab today.
🆕 Compliance Frameworks
We've expanded our compliance coverage to include three major standards:
Run a scan now to assess your posture against the latest industry benchmarks.
🛠️ IaC Provider powered by checkov
Prowler now supports Infrastructure-as-Code (IaC) scanning using Checkov!
Simply point it at your local files and catch security issues before you deploy:
Shift left with IaC scanning—now available in Prowler!
UI
🚀 Added
SnippetChip
component and show resource name in new findings table (#7813)Scan ID
filter by adding more context and enhancing the UI/UX (#8046)🔄 Changed
Provider UID
filter to scans page (#7820)v14.2.29
across Prowler and Cloud environments for consistency and improved maintainability (#7962)🐞 Fixed
API
🚀 Added
GET /compliance-overviews
endpoints to retrieve compliance metadata and specific requirements statuses (#7877)🔄 Changed
GET /compliance-overviews
to return proper requirement metrics (#7877)user
andpassword
for M365 provider [(#7992)](https://redirect.github.com/prowler-cloud/prowler/pull/7992Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.