No agents. No infrastructure in your account. No long-lived credentials.
Connect in minutes, revoke instantly.
One click creates a read-only IAM role in your account. Nothing else — no agents, no sidecars, no infrastructure.
Temporary credentials issued by AWS, valid for one session. We never store or persist them.
We read resource metadata — the same information visible in the AWS Console. No data, no secrets, no logs.
Delete the CloudFormation stack and access is gone instantly. No cleanup, no lingering credentials.
The IAM role uses the AWS-managed ViewOnlyAccess policy plus two S3 permissions. That's it.
Describe*, List*, Get* across AWS services. The same read-only view as your AWS Console.
s3:GetBucketLocationRead which region a bucket lives in — needed to map bucket→region relationships.
s3:GetBucketTaggingRead bucket tags — needed to detect cost allocation and environment labels.
Every permission is Describe*, List*, Get* — all read-only. No Create, Put, Delete, or Update.
We only read resource metadata — the same information visible in the AWS Console resource lists.
Every Fegura installation gets a unique external ID baked into the IAM trust policy. This prevents confused deputy attacks — no other service or customer can assume your role, even if they know the role ARN.
The IAM role name itself is unique per installation (FeguraRole-{externalId}), so reconnecting never conflicts with a previous setup.
If you discover a security vulnerability, please report it to security@fegura.ai. We take all reports seriously and will respond within 48 hours.