Paste any IAM policy JSON to scan for overly permissive rules, dangerous wildcards, privilege escalation paths, and security misconfigurations.
Paste an IAM policy JSON and clickAnalyze Policy to see findings.