Aurelian is an open-source cloud security framework written in Go that unifies reconnaissance, secrets discovery, and IAM analysis across AWS, Azure, and GCP. It ships 25 modules, evaluates resource policies using real IAM evaluation logic, validates discovered credentials against live APIs, and maps privilege escalation paths to Neo4j. It runs as a CLI or a Go library. Aurelian is the heart of Praetorian Guard’s cloud capabilities.
Aurelian is built for penetration testers, not compliance auditors. It evaluates resource policies using actual IAM evaluation logic rather than checking configuration flags. It includes secrets discovery with live validation, privilege escalation graph analysis, and subdomain takeover detection.
Yes. The analyze-iam-permissions module evaluates every principal’s effective permissions to detect privilege escalation paths, cross-account access, and create-then-use attack patterns. The graph module exports the full relationship graph to Neo4j for Cypher-based querying of multi-hop escalation chains.
Unlike tools that check a single boolean flag, Aurelian evaluates the actual resource policy using an IAM policy evaluation engine that considers condition keys, SCPs, and resource ARN patterns. It identifies resources that are truly public even when configuration flags say otherwise.