SWE Catalog
Home Browse Analysis About
Home / Catalog / Weakness Pattern / LeastPrivilegeViolation

LeastPrivilegeViolation

All SWE patterns tagged with Weakness Pattern: LeastPrivilegeViolation

1 SWE Patterns
Weakness Pattern
SWE-5002 ℵ₁

Cloud IAM Permission Overreach

Cloud IAM roles and policies configured with excessive permissions, violating the principle of least privilege. This includes EC2 instances with broad...

3 examples

No SWE patterns found matching your criteria.

© 2025 Fetch Schema. Schema Weakness Enumeration (SWE) Catalog.

Preventing data integrity failures, one pattern at a time.