fix(deps): update toniblyx/prowler docker tag to v5.17.1 #76
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
5.2.0→5.17.1Release Notes
prowler-cloud/prowler (toniblyx/prowler)
v5.17.1: Prowler 5.17.1Compare Source
API
🐞 Fixed
manage.pyargument detection (#9856)NoneNeo4j database when an Attack Paths scan is scheduled (#9858)Findings.all_objectsto avoid theActiveProviderPartitionedManager(#9869)v5.17.0: Prowler 5.17.0Compare Source
✨ New features to highlight in this version
Enjoy them all now for free at https://cloud.prowler.com
🕸️ Attack Paths
A brand new Attack Paths feature powered by Cartography and Neo4j graph database enables you to visualize and analyze potential attack vectors across your AWS environments. This feature allows security teams to:
🗂️ Resource Groups Overview
A new Resource Groups feature provides aggregated views of your cloud resources organized by security-relevant groupings (e.g., Compute, Storage, Network, Identity). This helps you quickly understand which resource categories have the most security issues.
📊 Redesigned Findings Table
The findings table has been completely rebuilt with a new design system, offering:
📋 Compliance Watchlist
A new Compliance Watchlist component on the Overview page lets you monitor your most critical compliance frameworks at a glance. Track pass/fail ratios and quickly navigate to detailed compliance views.
🎯 ThreatScore Pillar Breakdown
The Compliance Summary page now includes a detailed ThreatScore pillar breakdown, giving you visibility into how each security pillar (Identity, Data Protection, Network Security, etc.) contributes to your overall risk score.
📈 Enhanced Risk Plot
The Risk Plot has been improved with:
🏛️ AWS European Sovereign Cloud
Full support for AWS European Sovereign Cloud regions, enabling organizations with strict data residency requirements to leverage Prowler's security scanning capabilities.
Read more about it in our blog: AWS EUSC with Prowler
☁️ Alibaba Cloud Provider (Full Support)
Alibaba Cloud now has full support in the Prowler App! After being introduced in the CLI in v5.15.0, this release brings complete API and UI integration, enabling you to:
Explore all 63 Alibaba Cloud checks at Prowler Hub.
☁️ Cloudflare Provider - CLI Only
Prowler now supports Cloudflare as a first-class cloud provider! Scan your Cloudflare infrastructure for security misconfigurations across zones, DNS, email, WAF, and more.
Available checks include:
Explore all Cloudflare checks at Prowler Hub.
📚 New Compliance Frameworks
CIS 5.0 for Azure
The latest CIS Azure Foundations Benchmark v5.0 is now available, bringing updated security controls aligned with current Azure best practices.
CIS 6.0 for Microsoft 365
New CIS Microsoft 365 Benchmark v6.0 compliance framework for comprehensive M365 security assessment.
CIS 1.12 for Kubernetes
Updated CIS Kubernetes Benchmark v1.12 with the latest container security controls.
🤖 AI Skills Pack
Prowler now includes an AI Skills Pack for AI coding assistants like Claude Code, OpenCode, and Codex. Following the agentskills.io standard, this enables AI assistants to better understand Prowler's codebase and contribute more effectively.
🧩 New Checks
GCP - Compute (10 new checks)
compute_instance_group_multiple_zones- Ensure instance groups span multiple zones for HAcompute_instance_group_autohealing_enabled- Verify autohealing is configuredcompute_instance_group_load_balancer_attached- Check load balancer attachmentcompute_instance_disk_auto_delete_disabled- Prevent accidental data losscompute_configuration_changes- Detect configuration changes in Cloud Audit Logscompute_instance_single_network_interface- Enforce single NIC policycompute_image_not_publicly_shared- Prevent public image exposurecompute_snapshot_not_outdated- Identify stale snapshotscompute_project_os_login_2fa_enabled- Enforce 2FA for OS Logincompute_instance_on_host_maintenance_migrate- Verify live migration settings🚀 Azure Entra Performance
We've improved performance when retrieving user registration and MFA details from the Azure and M365 Entra services. As part of this enhancement, an additional API call is now required for Azure, which means that service principals used to scan Azure must be granted the
Audit.Read.Allpermission. You can find more details in our documentation.🔐 Security Updates
Security patches across all components:
UI
🚀 Added
🔄 Changed
__informat for multi-select support (#9492)🐞 Fixed
🔐 Security
API
🚀 Added
/api/v1/overviews/compliance-watchlistendpoint to retrieve the compliance watchlist (#9596)/api/v1/overviews/resource-groupsendpoint to retrieve an overview of resource groups based on finding severities (#9694)groupfilter forGET /findingsandGET /findings/metadata/latestendpoints (#9694)provider_idandprovider_id__infilter aliases for findings endpoints to enable consistent frontend parameter naming (#9701)/api/v1/attack-paths-scansfor AWS providers backed by Neo4j (#9805)🔐 Security
safetyto3.7.0andfilelockto3.20.3due to Safety vulnerability 82754 (CVE-2025-68146) (#9816)pyasn1to v0.6.2 to address CVE-2026-23490 (#9818)django-allauth[saml]to v65.13.0 to address CVE-2025-65431 (#9575)SDK
🚀 Added
compute_instance_group_multiple_zonescheck for GCP provider (#9566)compute_instance_group_autohealing_enabledcheck for GCP provider (#9690)compute_instance_disk_auto_delete_disabledcheck for GCP provider (#9604)ResourceGroupfield to all check metadata for resource classification (#9656)compute_configuration_changescheck for GCP provider to detect Compute Engine configuration changes in Cloud Audit Logs (#9698)compute_instance_group_load_balancer_attachedcheck for GCP provider (#9695)Cloudflareprovider with critical security checks (#9423)TLS/SSL,recordsandemailchecks forzoneservice (#9424)compute_instance_single_network_interfacecheck for GCP provider (#9702)compute_image_not_publicly_sharedcheck for GCP provider (#9718)compute_snapshot_not_outdatedcheck for GCP provider (#9774)compute_project_os_login_2fa_enabledcheck for GCP provider (#9839)compute_instance_on_host_maintenance_migratecheck for GCP provider (#9834)CloudflareBot protection, WAF, Privacy, Anti-Scraping and Zone configuration checks (#9425)🔄 Changed
user_registration_detailsperfomance and usermfaevaluation (#9236)🐞 Fixed
🔐 Security
safetyto3.7.0andfilelockto3.20.3due to Safety vulnerability 82754 (CVE-2025-68146) (#9816)pyasn1to v0.6.2 to address CVE-2026-23490 (#9817)v5.16.1: Prowler 5.16.1Compare Source
UI
🔄 Changed
API
🔄 Changed
🐞 Fixed
SDK
🐞 Fixed
v5.16.0: Prowler 5.16.0Compare Source
✨ New features to highlight in this version
Enjoy them all now for free at https://cloud.prowler.com
🤖 Lighthouse AI + MCP Server
This release introduces major improvements to Lighthouse AI, now powered by Prowler’s official MCP Server, significantly enhancing performance, reliability, and the quality of AI-driven interactions across the platform:
Together, these improvements make Lighthouse AI more robust, scalable, and capable of delivering actionable security and compliance insights through natural language.
🔇 Simple Mutelist
Findings can be muted after scanning from the finding table. A new page is available in /mutelist where the user can handle simple and advanced Mutelist configuration.
🗂️ Category Overview & Filtering
We've introduced a powerful new way to analyze your security posture by category. A new endpoint provides an overview of categories based on finding severities, giving you instant visibility into how different security domains are performing across your environment. Additionally, both
GET /findingsandGET /findings/latestendpoints now support category filtering, making it easier to drill down into specific security domains.📄 Enhanced PDF Reporting
PDF reports now include richer context with Account ID, Alias, and Provider Name directly in the reporting table. This makes exported reports more actionable and easier to share across teams, providing all the context needed without cross-referencing other sources.
⚡ Performance & Reliability Improvements
The
GET /overviews/attack-surfacesendpoint has been streamlined by removing related check IDs from the response, improving performance and reducing payload size. Additionally, scheduled scan tasks now have a more reliable initialization with optimized execution timing.🛡️ New AWS Security Categories
Two new AWS check categories have been added:
privilege-escalationandec2-imdsv1.These categories improve visibility into high-risk misconfigurations, helping teams more easily identify paths to privilege escalation and legacy EC2 Instance Metadata Service v1 usage.
🔄 Updated AWS Service Metadata
Multiple AWS services have been migrated to the new service metadata format, including Glue, Kafka, KMS, MemoryDB, Inspector v2, Service Catalog, SNS, Trusted Advisor, and WAF (v1 and v2).
These updates improve consistency, accuracy, and long-term maintainability across AWS checks.
🧹 Data & Category Consistency Fixes
Several fixes improve correctness and normalization across providers:
trust-boundariescategory naming.UI
🚀 Added
🔄 Changed
🐞 Fixed
API
🚀 Added
GET /findingsandGET /findings/latestscan now use the category filter (#9529)🔄 Changed
GET /overviews/attack-surfacesno longer returns the related check IDs (#9529)🐞 Fixed
scan_ida required filter in the compliance overview endpoint (#9560)SDK
🚀 Added
privilege-escalationandec2-imdsv1categories for AWS checks (#9537)🔄 Changed
🐞 Fixed
trustboundariescategory totrust-boundaries(#9536)bedrock-agentregional availability, now using official AWS docs instead of copying frombedrockMCP
🚀 Added
🔄 Changed
v5.15.1: Prowler 5.15.1Compare Source
UI
🔐 Security
API
🐞 Fixed
SDK
🐞 Fixed
apigateway_restapi_logging_enabledcheck by refining stage logging evaluation to ensure logging level is not set to "OFF" (#9304) - Thanks to @bota4gov5.15.0: Prowler 5.15.0Compare Source
✨ New features to highlight in this version
Enjoy them all now for free at https://cloud.prowler.com
🎯 New Overview Experience
We've expanded and refined the Overview to give you a clearer, more actionable understanding of your cloud security posture at a glance. The new panels bring richer visual context, better prioritization cues, and faster navigation across your environments.
🚨 Attack Surface
Instantly understand your most exposed risks, including internet-facing resources, leaked secrets, privilege-escalation paths, and critical misconfigurations.
📡 Service Watchlist
A real-time view of your riskiest cloud services, helping you focus remediation on the areas with the highest impact.
📈 Findings Severity Over Time
Track how your security posture evolves. This panel visualizes severity trends (Critical, High, Medium, Low, Informational) across days, weeks, or months so you can measure progress and detect regressions.
🧬 Risk Pipeline
A complete flow of findings from their source providers (AWS, Azure, Google Cloud, Kubernetes, GitHub, Microsoft 365, OCI, IaC, MongoDB Atlas) into their severity levels. Ideal for understanding where risk originates and how it distributes across your environments.
🌍 Threat Map
A global, region-based view of findings to help you quickly pinpoint where misconfigurations occur geographically, with pass/fail ratios per region.
🧮 Risk Plot
A severity-weighted visualization of your Threat Score, enabling you to immediately identify high-risk environments and understand how critical findings influence overall exposure, not just by volume but by impact.
⏳ Navigation Loading Bar
To improve the overall user experience, we've introduced a new navigation loading bar. This subtle progress indicator replaces silent page transitions, giving users immediate feedback that something is happening in the background. It makes the interface feel faster, smoother, and more responsive, especially when loading large datasets.
🤖 MCP Server - Prowler Management
The Prowler MCP Server has been completely redesigned to give AI assistants and LLMs control over your Prowler environment. The new version introduces comprehensive tools for:
This enables powerful AI-driven security workflows. Ask your AI assistant to scan your accounts, identify critical findings, or generate compliance reports, all through natural language.
🌐 New Cloud Providers
🍃 MongoDB Atlas
MongoDB Atlas is now fully supported in the Prowler App, enabling you to assess and monitor the security posture of your managed database clusters directly from the UI.
☁️ Alibaba Cloud (CLI Only)
Alibaba Cloud is now available in the Prowler CLI. Full Prowler App support is coming in the next release!
See the 63 available checks in Prowler Hub
🤖 Lighthouse AI - Amazon Bedrock API Key Support
Lighthouse AI now supports Amazon Bedrock API key authentication as an alternative to IAM access keys. This simplifies onboarding by allowing users to authenticate with a single API key instead of managing IAM credentials. Both authentication methods (IAM Access Key Pair and Bedrock API Key) are fully supported.
Read more about it here.
📚 Compliance Improvements
🔒 CIS 2.0 for Alibaba Cloud
New CIS Alibaba Cloud Foundation Benchmark v2.0.0 compliance framework, providing comprehensive security configuration guidelines for Alibaba Cloud environments.
✅ SOC 2 Processing Integrity
Added Processing Integrity requirements to the SOC 2 compliance framework for AWS, Azure, and GCP providers, expanding coverage for data processing controls.
🏦 RBI Cyber Security Framework - Thanks to @KonstGolfi
New RBI Cyber Security Framework compliance support for Azure provider, helping organizations in the Indian financial sector meet regulatory requirements.
📦
pnpmMigrationThe UI has migrated from
npmtopnpmfor package management, bringing faster installs, stricter dependency resolution, and more consistent builds across environments.🔍 All Providers in Prowler Hub
Explore all Prowler security checks, compliance frameworks, and supported providers in one place at Prowler Hub. Browse checks by provider, search for specific security controls, and discover which compliance frameworks map to each check, all in a beautifully designed, searchable interface.
🧩 New Checks
GitHub - Repository
repository_immutable_releases_enabled- Thanks to @Sakeeb91GCP - Compute & CloudStorage
compute_instance_preemptible_vm_disabledcompute_instance_automatic_restart_enabledcompute_instance_deletion_protection_enabledcloudstorage_uses_vpc_service_controlsUI
🚀 Added
onRouterTransitionStart(#9465)🔄 Changed
🐞 Fixed
API
🚀 Added
GET /api/v1/overviews/findings_severity/timeseriesto retrieve daily aggregated findings by severity level (#9363)🔄 Changed
SDK
🚀 Added
cloudstorage_uses_vpc_service_controlscheck for GCP provider (#9256)repository_immutable_releases_enabledcheck for GitHub provider (#9162)compute_instance_preemptible_vm_disabledcheck for GCP provider (#9342)compute_instance_automatic_restart_enabledcheck for GCP provider (#9271)compute_instance_deletion_protection_enabledcheck for GCP provider (#9358)🔄 Changed
🐞 Fixed
cloudstorage_uses_vpc_service_controlscheck to handle VPC Service Controls blocked API access (#9478)MCP
🚀 Added
v5.14.2: Prowler 5.14.2Compare Source
UI
🐞 Fixed
🔒 Security
API
🐞 Fixed
SDK
🐞 Fixed
v5.14.1: Prowler 5.14.1Compare Source
API
🐞 Fixed
SDK
🐞 Fixed
sharepoint_external_sharing_managedcheck to handle external sharing disabled at organization level (#9298)exchange_mailbox_policy_additional_storage_restrictedcheck (#9241)v5.14.0: Prowler 5.14.0Compare Source
New features to highlight in this version
Enjoy them all now for free at https://cloud.prowler.com
🤖 Lighthouse AI: Multi-LLM Support
Lighthouse AI now supports multiple AI providers, giving customers full flexibility over cost, performance, and data control. Supported model providers:
🌐 New Cloud Providers
☁️ Oracle Cloud Infrastructure (OCI)
Prowler App now supports OCI as a cloud provider with 51 checks and support for CIS OCI Foundations Benchmark v3.0.0. This allows you to analyze the security posture of your OCI tenants. See all check details in Prowler Hub.
For more details check our Getting Started with Oracle Cloud Infrastructure (OCI) guide.
🧱 Infrastructure-as-Code — Powered by Trivy
A brand-new IaC provider enables scanning for:
Powered by trivy, this provides policy-as-code scanning to detect misconfigurations before they are deployed.
For more details check our Getting Started with the IaC Provider guide.
🍃 MongoDB Atlas (API Only)
MongoDB Atlas is now available in the API and will have full support in the next release!
See the 10 available checks in Prowler Hub.
🎨 Prowler App - New UI
Prowler App has been refreshed with a more modern UI. The new layout improves navigation, readability, and performance across all the whole application.
📊 New Overview Experience
We’ve redesigned the Overview dashboard to show clearer security posture insights:
📰 RSS Feed for Updates
You can now subscribe to real-time release announcements and incident notifications via the new RSS feed integrated in the Latest Updates panel.
Performance Optimization
We've improved performance across all scan related tasks:
/metadataendpoint📚 Compliance Improvements
New Compliance Frameworks
Reporting Improvements
We've added PDF reporting for ENS, NIS2 and Prowler ThreatScore. Available in the Compliance page!
🐳 ARM images available in Docker Hub
Multi-architecture images (
linux/amd64andlinux/arm64) are now available for Prowler container images.Huge thanks to @sanchezpaco for this contribution!
🧩 New Checks
AWS - Code Pipeline
codepipeline_project_repo_private- Thanks to @yyyy7246GCP - Cloud Storage
cloudstorage_bucket_versioning_enabledcloudstorage_bucket_soft_delete_enabledcloudstorage_bucket_logging_enabledcloudstorage_audit_logs_enabledcloudstorage_bucket_sufficient_retention_periodAzure - Database for PostgreSQL flexible server
postgresql_flexible_server_entra_id_authentication_enabled- Thanks to @johannes-engler-mw📦 Resources – New Auditor Mode (API Only)
We’ve expanded the
/resourcesendpoint adding ametadatafield, containing the raw, unmodified response returned by the Cloud Provider API. This gives full transparency into what Prowler received from the Cloud Provider before any processing or normalization.🔥 ThreatScore for Kubernetes
ThreatScore is now available for the Kubernetes provider, offering instant visibility into the security posture of your clusters.
🛠️ Check Metadata
We're continuing standardizing the metadata format for dozens of AWS, GCP, GitHub, Kubernetes, OracleCloud, and MongoDB Atlas services improving consistency and maintainability.
UI
🚀 Added
🔄 Changed
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.