Prowler for Scaleway scans IAM resources in your Scaleway organization for security misconfigurations. The current release ships one check that flags API keys still owned by the account root user.Documentation Index
Fetch the complete documentation index at: https://prowler-scaleway-provider.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Prerequisites
- A Scaleway organization with IAM access.
- A Scaleway API key with at least the
IAMReadOnlypolicy bound to a dedicated IAM user (do not use the account root user). - Your organization ID (visible at the top right of the Scaleway console).
Authentication
Prowler reads credentials from the standard Scaleway environment variables:| Variable | Purpose |
|---|---|
SCW_ACCESS_KEY | API key access key |
SCW_SECRET_KEY | API key secret key |
SCW_DEFAULT_ORGANIZATION_ID | Optional, required when the key bearer is an application |
SCW_DEFAULT_PROJECT_ID | Optional, default project for project-scoped resources |
SCW_DEFAULT_REGION | Optional, defaults to fr-par |
--access-key, --secret-key, --organization-id, --project-id, --region). The CLI emits a warning when secrets are passed via the command line; environment variables are preferred.
Run a scan
Checks shipped
| Check ID | Severity | Description |
|---|---|---|
iam_no_root_api_keys | Critical | Fails when any Scaleway IAM API key is still owned by the account root user. |
Required Scaleway permissions
The API key bearer needs read access to the IAM API in order to list users and API keys. TheIAMReadOnly policy is sufficient. Refer to the Scaleway IAM policy reference for the full list of permissions.
