From 80f43191912cd0cba9bdaffd3d45212065045660 Mon Sep 17 00:00:00 2001 From: Mike Vanbuskirk Date: Thu, 17 Aug 2023 18:45:03 -0400 Subject: [PATCH] minor fixups --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 3518590206e8..cc65831146f0 100644 --- a/README.md +++ b/README.md @@ -226,9 +226,9 @@ $ trufflehog git https://github.com/trufflesecurity/trufflehog.git ## S3 -The S3 source now supports assuming IAM roles for scanning in addition to IAM users. This makes it easier for users to scan multiple AWS accounts without needing to rely on hardcoded credentials for each account. +The S3 source supports assuming IAM roles for scanning in addition to IAM users. This makes it easier for users to scan multiple AWS accounts without needing to rely on hardcoded credentials for each account. -The IAM identity that Trufflehog uses initially will need to have `AssumeRole` privileges as a principal in the [trust policy](https://aws.amazon.com/blogs/security/how-to-use-trust-policies-with-iam-roles/) of each IAM role to assume. +The IAM identity that TruffleHog uses initially will need to have `AssumeRole` privileges as a principal in the [trust policy](https://aws.amazon.com/blogs/security/how-to-use-trust-policies-with-iam-roles/) of each IAM role to assume. To scan a specific bucket using locally set credentials or instance metadata if on an EC2 instance: