fix(deps): update toniblyx/prowler docker tag to v5.22.0#76
Open
renovate[bot] wants to merge 1 commit intodevfrom
Open
fix(deps): update toniblyx/prowler docker tag to v5.22.0#76renovate[bot] wants to merge 1 commit intodevfrom
renovate[bot] wants to merge 1 commit intodevfrom
Conversation
Contributor
Author
Branch automerge failureThis PR was configured for branch automerge. However, this is not possible, so it has been raised as a PR instead.
|
8238903 to
37bfb6d
Compare
37bfb6d to
ce2f27e
Compare
d2a4abc to
f06c9ed
Compare
0558c00 to
ff99ee4
Compare
fa775f0 to
1967a23
Compare
da539fb to
2b69680
Compare
91269de to
48c03c7
Compare
59c0042 to
432cab4
Compare
9dc50c7 to
da11635
Compare
8ac9a46 to
3b37972
Compare
cd60360 to
d72cb90
Compare
d72cb90 to
aa3f405
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
5.2.0→5.22.0Release Notes
prowler-cloud/prowler (toniblyx/prowler)
v5.22.0: Prowler 5.22.0Compare Source
✨ New features to highlight in this version
Enjoy them all now for free at https://cloud.prowler.com
Findings page — Batch filter apply
Selecting filters no longer triggers a page re-render on each change. A new "Apply Filters" button lets you configure multiple filters before executing the query, fixing layout shifts and improving responsiveness.
Attack Paths — Custom queries
Run custom
openCypherqueries against your Attack Paths graph alongside predefined queries. Use Lighthouse AI to help generate them.Predefined Attack Paths queries now run faster 🚀
Read more about it in Attack Paths documentation
🙌 Community Contributors
defusedxmlin SAML metadata parsing to prevent XML bomb (billion laughs) DoS attacks (#10165)UI
🚀 Added
🔄 Changed
API
🚀 Added
check_titlesubstring filtering (#10377)🐞 Fixed
🔐 Security
defusedxmlin SAML metadata parsing to prevent XML bomb (billion laughs) DoS attacks (#10165)flaskto 3.1.3 (CVE-2026-27205) andwerkzeugto 3.1.6 (CVE-2026-27199) (#10430)SDK
🐞 Fixed
vm_backup_enabledandvm_sufficient_daily_backup_retention_periodchecks now compare VM names case-insensitively to avoid false negatives when Azure stores backup item names in a different case (#10395)entra_non_privileged_user_has_mfaskips disabled users to avoid false positives (#10426)v5.21.1: Prowler 5.21.1Compare Source
API
🐞 Fixed
COUNT(DISTINCT)overhead (#10394)v5.21.0: Prowler 5.21.0Compare Source
✨ New features to highlight in this version
Enjoy them all now for free at https://cloud.prowler.com
🏛️ Google Workspace - Full App Support
Google Workspace provider is now fully integrated with the Prowler App. You can now connect and scan your Google Workspace environment directly from the UI.
Read more in our Google Workspace documentation.
Explore all Google Workspace checks at Prowler Hub.
🤖 Lighthouse AI
We've added a new system to provide AI skills to Lighthouse AI alongside the first one: Attack Path Custom Query. This skill provides the LLM with
openCyphersyntax guidance and Cartography schema knowledge for writing graph queries against Prowler's data.This was included alongside a new tool in the Prowler MCP to get the Cartography's scan schema.
📖 Check Metadata
We've completed the check's metadata migration to the new format 🎉 Now all are structured in the same way.
Huge shoutout to the Prowler's Detection&Remediation team for this massive effort!
Read more in our Check Metadata Guidelines
⌛ AWS Resource Timeline
You can now see the last 90 days of AWS CloudTrail events for a given findings!
AWS resource modification history is now visible directly in the App. A new Events tab in Findings and Resource detail cards shows an AWS CloudTrail timeline with expandable event rows, actor details, request/response JSON payloads, and error information. A read-event toggle lets you include or exclude read-only API calls from the timeline.
🐳 Container Image
Container Image provider is now fully integrated with the Prowler App. You can now connect and scan your container registry directly from the UI.
Read more in our Container Image documentation.
🏛️ AWS Organizations Improvements
We've upgraded AWS Organizations management in the Cloud Providers page with greater flexibility and control. You can now edit organization names and credentials, run connection tests across all accounts or scoped to a specific organizational unit, and delete individual organizational units or full organizations.
🕸️ Attack Paths Improvements
We continued improving Attack Paths UX by improving performance and adding more labels to improve filtering when using custom queries.
📄 Compliance
We've improved compliance coverage with the following frameworks:
🔍 New Checks
Microsoft 365
entra_conditional_access_policy_device_code_flow_blocked- Conditional Access policy blocks device code flow to prevent phishing attacksentra_conditional_access_policy_require_mfa_for_admin_portals- Conditional Access policy requires MFA for Microsoft Admin PortalsExplore all Microsoft 365 checks at Prowler Hub.
Github
organization_repository_deletion_limited- Organization repository deletion and transfer is restricted to owners - Thanks to @shalkodaExplore all Github checks at Prowler Hub.
🙌 Community Contributors
organization_repository_deletion_limitedcheck for Github (#10185)--regionflag (#9952)CORS_ALLOWED_ORIGINSconfigurable via environment variable (#10355)UI
🚀 Added
🔄 Changed
API
🚀 Added
CORS_ALLOWED_ORIGINSconfigurable via environment variable (#10355)🔄 Changed
🐞 Fixed
graph_data_readyflag when scan fails during graph swap, preventing query endpoints from staying blocked until the next successful scan (#10354)🔐 Security
psycopg2.sqlto safely compose DDL inPostgresEnumMigration, preventing SQL injection via f-string interpolation (#10166)SDK
🚀 Added
misconfigscanner as default for Image provider scans (#10167)entra_conditional_access_policy_device_code_flow_blockedcheck for M365 provider (#10218)entra_conditional_access_policy_require_mfa_for_admin_portalscheck for Azure provider and update CIS compliance (#10330)organization_repository_deletion_limitedcheck for GitHub provider (#10185)🔄 Changed
pygithubfrom 2.5.0 to 2.8.0 to use native Organization properties🐞 Fixed
--regionflag (#9952)🔐 Security
multipartto 1.3.1 to fix GHSA-p2m9-wcp5-6qw3 (#10331)MCP
🚀 Added
v5.20.0: Prowler 5.20.0Compare Source
✨ New features to highlight in this version
Enjoy them all now for free at https://cloud.prowler.com
🏛️ AWS Organizations Improvements
🕸️ Attack Paths Improvements
APOCto standardopenCyphermigration: Network exposure queries now use standard openCypher instead of APOC procedures, making them use better open standards🏛️ Google Workspace - API Only
Google Workspace is now fully integrated with the Prowler API. After being introduced as a CLI-only provider in v5.19.0, you can now connect and scan your Google Workspace environment directly from the API. Full App support will be included in the next release.
Read more in our Google Workspace documentation.
Explore all Google Workspace checks at Prowler Hub.
☁️ OpenStack — Object Storage Service
OpenStack continues to expand with a brand new Object Storage service adding 7 security checks covering container access control, versioning, encryption, metadata hygiene, and lifecycle management.
Read more in our OpenStack documentation.
Explore all OpenStack checks at Prowler Hub.
🔍 New Checks
AWS
guardduty_delegated_admin_enabled_all_regions- Verify that a delegated administrator account is configured for GuardDuty - Thanks to @m-wentz!opensearch_service_domains_not_publicly_accessible- Now supports atrusted_ipsconfiguration option. If your OpenSearch domain has a resource policy restricting access to known IPs, you no longer get a false positive on the public accessibility check — Thanks to @codename470!Explore all AWS checks at Prowler Hub.
Microsoft 365
entra_conditional_access_policy_approved_client_app_required_for_mobile— Requires approved client apps on mobile devicesentra_conditional_access_policy_compliant_device_hybrid_joined_device_mfa_required— Requires compliant/hybrid-joined device or MFAExplore all M365 checks at Prowler Hub.
🐞 Bug Fixes
We've added several bug fixes to improve the user experience across the application.
⛵ Community Helm Chart
Prowler now has an official community-maintained Helm chart for self-hosted deployments on Kubernetes. The chart is published as an OCI artifact to
oci://ghcr.io/prowler-cloud/charts/prowleron every release.Check it on https://ghcr.io/prowler-cloud/charts/prowler
Thanks to @Ca-moes and @Utwo for building and maintaining this chart!
🙌 Community Contributors
guardduty_delegated_admin_enabled_all_regionscheck for AWS (#9867)trusted_ipsconfig for OpenSearch check (#8631)UI
🔄 Changed
🐞 Fixed
🔐 Security
API
🔄 Changed
POST /api/v1/providersreturns409 Conflictif already exists (#10293)🐞 Fixed
exposed_internetnot set on ELB/ELBv2 nodes (#10272)SDK
🚀 Added
entra_conditional_access_policy_approved_client_app_required_for_mobilecheck for M365 provider (#10216)entra_conditional_access_policy_compliant_device_hybrid_joined_device_mfa_requiredcheck for M365 provider (#10197)trusted_ipsconfigurable option foropensearch_service_domains_not_publicly_accessiblecheck to reduce false positives on IP-restricted policies (#8631)guardduty_delegated_admin_enabled_all_regionscheck for AWS provider (#9867)🔄 Changed
v5.19.0: Prowler 5.19.0Compare Source
✨ New features to highlight in this version
Enjoy them all now like a Pro at https://cloud.prowler.com
🏛️ AWS Organizations Onboarding
Connect multiple AWS accounts from your Organization in a single flow. Select accounts from your AWS Organization hierarchy and onboard them all at once — no more adding accounts one by one.
Read more in our AWS Organizations in Prowler Cloud documentation.
📤 Import Findings
Scan results can now be imported into Prowler Cloud for centralized visibility and correlation. Available via:
--push-to-cloudflag uploads findings in OCSF directlyPOST /api/v1/ingestionsendpoint for CI/CD and automation workflowsRead more in our import findings documentation. Thanks to @sonofagl1tch for their contribution and continued support!
☁️ OpenStack — Multi-Region & New Services
OpenStack support matures with:
Read more in our OpenStack documentation.
Explore all OpenStack checks at Prowler Hub.
🐳 Container Image Scanning
A brand new Image provider powered by Trivy brings container image security scanning to Prowler. Scan individual images or entire registries for vulnerabilities:
Read more in our Image provider documentation.
Explore all Image checks at Prowler Hub.
🏢 Google Workspace Provider - CLI
A new Google Workspace provider brings organizational security visibility to Prowler, starting with the Directory service.
It's the 1st provider in Prowler for @lydiavilchez 🙌
Explore all Google Workspace checks at Prowler Hub
☁️ Cloudflare — Now in the App
After being introduced in the CLI in v5.17.0, Cloudflare now has full App support in the Prowler App with 29 security checks covering:
Read more in our Cloudflare documentation.
Explore all CloudFlare checks at Prowler Hub.
🕸️ Attack Paths — Major Upgrades
The Attack Paths feature receives significant enhancements in this release:
DatabaseError🤖 Attack Paths in Prowler MCP Server
The Prowler MCP Server now includes Attack Paths tools, enabling AI agents to query and analyze privilege escalation and lateral movement paths directly. Connect your AI assistant at mcp.prowler.com/mcp.
📚 New Compliance Frameworks
CSA CCM 4.0
The Cloud Security Alliance Cloud Controls Matrix v4.0 is now available across five providers: AWS, Azure, GCP, Oracle Cloud, and Alibaba Cloud.
CIS 6.0 for AWS
The latest CIS Amazon Web Services Foundations Benchmark v6.0 is now available, bringing updated security controls aligned with current AWS best practices.
SecNumCloud for AWS
The ANSSI SecNumCloud qualification framework is now available for AWS, covering French cloud security requirements.
🔗 Unified Provider Wizard
The provider connection flow has been completely redesigned into a modal wizard with a unified experience across all provider types.
🔍 New Checks
Microsoft 365
12 new security checks covering Entra ID, Defender for Identity, Defender XDR, and email protection.
entra_conditional_access_policy_app_enforced_restrictions— App enforced restrictionsentra_app_registration_no_unused_privileged_permissions— Unused privileged permissionsentra_seamless_sso_disabled— Seamless SSO disabledentra_conditional_access_policy_require_mfa_for_management_api— MFA for management APIdefenderidentity_health_issues_no_open— Defender for Identity healthdefenderxdr_endpoint_privileged_user_exposed_credentials— Exposed credentials detectiondefenderxdr_critical_asset_management_pending_approvals— Critical asset managementdefender_safe_attachments_policy_enabled— Safe Attachments policydefender_safelinks_policy_enabled— Safe Links policyentra_default_app_management_policy_enabled— Default app management policy enabledentra_authentication_method_sms_voice_disabled- Disable SMS and voice authenticationentra_break_glass_account_fido2_security_key_registered- Break glass accounts should have a FIDO2 security keyExplore all M365 checks at Prowler Hub.
AWS
Enhanced IAM privilege escalation detection with patterns from the pathfinding.cloud library
Explore all AWS checks at Prowler Hub.
OpenStack
26 new security checks across four services:
Compute (7 checks)
compute_instance_config_drive_enabled— Config drive for secure metadata deliverycompute_instance_isolated_private_network— Network isolation (private-only IPs)compute_instance_key_based_authentication— SSH key-based auth configurationcompute_instance_locked_status_enabled— Instance lock status protectioncompute_instance_metadata_sensitive_data— Secrets in instance metadatacompute_instance_public_ip_exposed— Publicly exposed instancescompute_instance_trusted_image_certificates— Image signature verificationNetworking (6 checks)
networking_security_group_allows_ssh_from_internet— SSH (port 22) exposed to the internetnetworking_security_group_allows_rdp_from_internet— RDP (port 3389) exposed to the internetnetworking_security_group_allows_all_ingress_from_internet— Security groups allowing all ingress from the internetnetworking_port_security_disabled— Networks/ports allowing MAC/IP spoofing attacksnetworking_subnet_dhcp_disabled— Subnets without DHCP auto-configurationnetworking_admin_state_down— Administratively disabled networksBlock Storage (7 checks)
blockstorage_volume_encryption_enabled— Volumes without encryption enabledblockstorage_volume_metadata_sensitive_data— Sensitive data in volume metadatablockstorage_snapshot_metadata_sensitive_data— Sensitive data in snapshot metadatablockstorage_volume_backup_exists— Volumes without any backupsblockstorage_volume_multiattach_disabled— Volumes with multi-attach enabledblockstorage_volume_not_unattached— Orphaned volumes with no attachmentsblockstorage_snapshot_not_orphaned— Snapshots referencing non-existent source volumesImage (6 checks)
image_not_publicly_visible— Publicly visible images exposing OS configs and credentialsimage_not_shared_with_multiple_projects— Images shared with too many projectsimage_signature_verification_enabled— Images without cryptographic signature verificationimage_protected_status_enabled— Images without deletion protectionimage_encryption_enabled— Images without guest memory encryption (AMD SEV)image_secure_boot_enabled— Images without Secure Boot requiredExplore all OpenStack checks at Prowler Hub.
GitHub
organization_verified_badge— Verified badge on GitHub organizations — thanks to @kushpatel321!Explore all Github checks at Prowler Hub.
🔐 Security Updates
py-ocsf-models0.8.1 andcryptography44.0.3Pillow12.1.1 (CVE-2021-25289)azure-core1.38.x removing CVE-2026-21226 safety ignoredefusedxmlXXE vulnerability fix for Alibaba Cloud OSS — thanks to @sandiyochristan!🔒 CI Security Hardening
GitHub Actions workflows have been audited and hardened using zizmor, which is now integrated into CI. Fixes include expression injection prevention, credential persistence controls, and overall workflow hardening in (#10200) (#10207) (#10208)
🙌 Community Contributors
organization_verified_badgecheck for GitHub provider (#10033)AWS_ENDPOINT_URLfor STS session creation (#10228)defusedxmlXXE vulnerability fix for Alibaba Cloud OSS (#9999)UI
🚀 Added
🔄 Changed
Top Failed Sectionswidth (#10018)🐞 Fixed
🔐 Security
API
🚀 Added
imageprovider support for container image scanning (#10128)🔄 Changed
graph_databaseandis_graph_database_deletedfields from AttackPathsScan model (#10077)graph_data_readyfield to decouple query availability from scan state (#10089)Acceptheader query endpoints also acceptstext/plain, supporting compact plain-text format for LLM consumption (#10162)🐞 Fixed
DatabaseErrorwhen provider is deleted mid-scan (#10116)🔐 Security
Pillowto 12.1.1 (CVE-2021-25289) (#10027)azure-core1.38.x (#10110)SDK
🚀 Added
entra_authentication_method_sms_voice_disabledcheck for M365 provider (#10212)Google Workspaceprovider support with Directory service including 1 security check (#10022)entra_conditional_access_policy_app_enforced_restrictionscheck for M365 provider (#10058)entra_app_registration_no_unused_privileged_permissionscheck for M365 provider (#10080)defenderidentity_health_issues_no_opencheck for M365 provider (#10087)organization_verified_badgecheck for GitHub provider (#10033)clouds_yaml_contentparameter for API integration (#10003)defender_safe_attachments_policy_enabledcheck for M365 provider (#9833)defender_safelinks_policy_enabledcheck for M365 provider (#9832)imageprovider for container image scanning with Trivy integration (#9984)ecs:ExecuteCommand+ecs:DescribeTasks(#10066)--export-ocsfCLI flag to upload OCSF scan results to Prowler Cloud (#10095)scan_idfield in OCSFunmappedoutput for ingestion correlation (#10095)defenderxdr_endpoint_privileged_user_exposed_credentialscheck for M365 provider (#10084)defenderxdr_critical_asset_management_pending_approvalscheck for M365 provider (#10085)entra_seamless_sso_disabledcheck for M365 provider (#10086)imageprovider: enumerate and scan all images from OCI standard, Docker Hub, and ECR (#9985)ulimits) for Docker Compose worker services to preventToo many open fileserrors (#10107)entra_conditional_access_policy_require_mfa_for_management_apicheck for M365 provider (#10150)entra_break_glass_account_fido2_security_key_registeredcheck for M365 provider (#10213)entra_default_app_management_policy_enabledcheck for M365 provider (#9898)--provider-uidCLI flag for IaC provider, used ascloud.account.uidin OCSF output and required with--export-ocsf(#10233)unmapped.provider_uidfield in OCSF output to match CLI scan results with API provider entities during ingestion (#10231)unmapped.providerfield in OCSF output for provider name availability in non-cloud providers like Kubernetes (#10240)🔄 Changed
repository_branch_delete_on_merge_enabledlogic (#9830)🐞 Fixed
DescribeVpcEndpointServicePermissions(#10152)AWS_ENDPOINT_URLenvironment variable for STS session creation (#10228)elbv2_insecure_ssl_ciphersfalse positive on AWS post-quantum (PQ) TLS policies likeELBSecurityPolicy-TLS13-1-2-PQ-2025-09[(#&chore(deps): update aws-cdk monorepo to v2.66.0 #8Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.