“These roles, often created automatically or recommended during setup, grant overly broad permissions, such as full S3 access,” Aqua researchers Yakir Kadkoda and Ofek Itach said in an analysis. “These default roles silently introduce attack paths that allow privilege escalation, cross-service access, and even potential account compromise.“
