Product
Everything you need to secure code, cloud, and runtime– in one central system
Code
Dependencies
Prevent open-source risks (SCA)
Secrets
Catch exposed secrets
SAST
Secure code as its written
Container Images
Secure images easily
Malware
Prevent supply chain attacks
Infrastructure as Code
Scan IaC for misconfigurations
License Risk & SBOMs
Avoid risk, be compliant
Outdated Software
Know your EOL runtimes
Cloud
Cloud / CSPM
Cloud misconfigurations
DAST
Black-box security testing
API Scanning
Test your API’s for vulns
Virtual Machines
No agents, no overhead
Kubernetes Runtime
soon
Secure your container workloads
Cloud Search
Cloud sprawl, solved
Defend
Runtime Protection
In-app Firewall / WAF
Features
AI AutoFix
1-click fixes with Aikido AI
CI/CD Security
Scan before merge and deployment
IDE Integrations
Get instant feedback while coding
On-Prem Scanner
Compliance-first local scanning
Solutions
Use Cases
Compliance
Automate SOC 2, ISO & more
Vulnerability Management
All-in-1 vuln management
Secure Your Code
Advanced code security
Generate SBOMs
1 click SCA reports
ASPM
End-to-end AppSec
AI at Aikido
Let Aikido AI do the work
Block 0-Days
Block threats before impact
Industries
FinTech
HealthTech
HRTech
Legal Tech
Group Companies
Agencies
Startups
Enterprise
Mobile apps
Manufacturing
Pricing
Resources
Developer
Docs
How to use Aikido
Public API docs
Aikido developer hub
Changelog
See what shipped
Security
In-house research
Malware & CVE intelligence
Glossary
Security jargon guide
Trust Center
Safe, private, compliant
Open Source
Aikido Intel
Malware & OSS threat feed
Zen
In-app firewall protection
OpenGrep
Code analysis engine
Integrations
IDEs
CI/CD Systems
Clouds
Git Systems
Compliance
Messengers
Task Managers
More integrations
About
About
About
Meet the team
Careers
We’re hiring
Press Kit
Download brand assets
Calendar
See you around?
Open Source
Our OSS projects
Blog
The latest posts
Customer Stories
Trusted by the best teams
Partner Program
Partner with us
Contact
Login
Start for Free
No CC required
Aikido
Menu
Aikido
EN
EN
FR
JP
DE
Login
Start for Free
No CC required
Blog
/
Introducing Aikido AI Cloud Search

Introducing Aikido AI Cloud Search

By
Madeline Lawrence
Madeline Lawrence
4 min read
Aikido
May 26, 2025

Introducing Cloud Search
From question to insight, in seconds.

Gain instant visibility into your cloud environment with Aikido Cloud Search. Search your cloud like a database. Whether you want to identify exposed databases, vulnerable virtual machines, or over-permissive IAM roles — Aikido gives you the power to uncover risk in seconds. No query language required, no waiting on devops.

Just describe what you’re looking for, like “Give me all VMs with CVE-2025-32433 that have port 22 open.”

Scroll down to "How It Works" to get technical. For now, let's jump right into what you can uncover with Aikido.

How it Works in Practice

After syncing your cloud environment, Aikido builds a dynamic graph of all your assets, enriched with cloud metadata (from AWS APIs) and security signals (e.g., vulnerabilities, EOL software, misconfigurations). Using natural language, you can query this asset graph — Aikido parses your input, translates it into graph logic, and returns the matching assets. Instantly gain visibility, explore related assets, understand the context of each risk, examine the search logic behind the results, and more.

See What Aikido Can Uncover

Query & Why It Matters

public s3 buckets

Public S3 buckets are frequently misconfigured and can lead to data exposure or leaks. There are also multiple ways to make a bucket public.

buckets outside eu

Helps enforce data residency compliance (e.g., GDPR), ensuring sensitive data doesn't leave allowed regions.

users without mfa

Accounts without Multi-Factor Authentication are vulnerable to account takeover via credential theft.

users with programmatic access

Identifies users who can interact with the cloud via API keys—these credentials are a common target for attackers.

databases without deletion protection

Prevents accidental or malicious deletion of critical databases.

Go Even Deeper with these Networking, IAM, CVEs/EOL Prompts

ec2 instances with open management ports

Ports like SSH (22) and RDP (3389) open to the internet are major attack vectors for unauthorized access.

rds databases allowing traffic from ec2 instances

Helps identify trust relationships and lateral movement paths that attackers could exploit.

lambda functions not running in VPCs

Functions outside VPCs may lack network controls and expose sensitive traffic to the public internet.

ec2 instances that might host databases

Helps identify data stores that may need additional protection or monitoring, even if not explicitly labeled.

lambdas with access to VPC endpoints

Misused Lambda functions with VPC access can interact with sensitive internal services or databases.

ec2 instances with access to s3 buckets

Detects possible data exfiltration paths via overly-permissive IAM roles.

lambdas that can create users

Functions with privilege to create users can be abused for persistence or privilege escalation.

iam roles accessible from other accounts

Cross-account access increases your attack surface and may be unmonitored.

users with admin privileges

Overprivileged users are a primary cause of security misconfigurations and insider threats.

overprivileged IAM roles

Detects roles with excessive permissions that exceed least-privilege best practices.

ec2 instances vulnerable to CVE-2025-21613

Allows targeted remediation of known, high-risk vulnerabilities in your infrastructure.

ec2 instances running outdated OS

Legacy systems often lack critical security patches and support, increasing risk.

vms with outdated python

Outdated runtimes can be vulnerable and incompatible with modern security libraries.

VM with critical vulnerabilities

Prioritizes remediation of VMs that have the highest likelihood of being exploited, based on vulnerability severity.

ec2 instances vulnerable to log4shell

Specific vulnerability targeting ensures you can patch critical zero-days quickly and thoroughly.

public ec2 instances vulnerable to CVE-2025-21613 with access to s3 buckets

Models an end-to-end attack chain: public exposure + vulnerability + access to sensitive data.

lambda functions created manually

Manual provisioning can bypass IaC guardrails or compliance checks.

functions exposed to the internet with admin permissions

Serverless resources with admin rights and internet exposure can be abused for privilege escalation and data exfiltration.

my riskiest datastores

Lets Aikido surface the highest-risk data assets based on exposure, vulnerability, and privilege — for prioritized protection.

Prompting Best Practices

1) Describe anything

There are no predefined prompts, terms, or rules to follow. You can describe anything you want to see from your cloud environment, and let Aikido figure out what it needs to search and generate the queries.

2) Use single keywords for broad discovery

Enter a single keyword, and Aikido will run a broad text search across your assets. For example, searching for a user’s name will return:

  • that user,
  • any groups they belong to,
  • assets where their name appears in tags,
  • and policies that mention them.

‍Tip: Use key terms like usernames, instance names, or tag values to quickly find relevant assets and permissions.For example, typing Alice might show you her user profile, groups she's in, EC2 instances tagged with her name, and IAM policies that mention her — all in one search.

3) Search memory

Aikido remembers your past searches, so results load faster the next time. You can also easily revisit your previous queries — they’re saved per user, just for your account. See search history for the keyterm bucket below:

‍

‍

How To Search Your Cloud

1. Go to Clouds then Assets.
‍
This is your unified cloud inventory view. Filter by cloud provider, account, or region as needed.
‍
2. Describe what you want
To query your cloud inventory, simply describe what you’re looking for in natural language. Aikido interprets your prompt, breaks it down into one or more logical steps, and retrieves the relevant assets. You’ll see intermediate results for each step as Aikido works toward the final output.
‍

‍

Natural language search example

‍

In the above example, the prompt "show me EC2 instances with access to S3 buckets" triggers the following process:

  • Identify EC2 instances with IAM roles (via instance profiles)
  • Find IAM roles with access to S3 (via inline or attached policies)
  • Locate S3 bucket policies granting access to those roles
  • Combine these findings into a final result

‍
3. Examine Findings

Aikido will surface all related assets to your search, understanding the context of your cloud environment. Aikido checks all mechanisms and considers a wide scope of aspects in each search, providing you insight far beyond the usual CSPM and corelating issues in seconds.

You can view a step-by-step breakdown by clicking the Explain Result button in the top right. Here’s what that looks like for the prompt above:

‍

4) Set custom rules, alerts, and tasks
Save any prompt as an alert. Stay on top of changes and emerging risks in your environment via email, Slack, Microsoft Teams or wherever you work. Create and automate tasks so your team is immediately notified when critical conditions are met, like EC2 instances accessible from the internet on management ports. With Aikido, alerts aren’t just noise — they’re tailored, actionable, and built around the exact questions your team cares about.

‍

With that, the power of search is in your hand. Go from question to insights in seconds with Aikido. Search your cloud today. What will you find?

Written by Madeline Lawrence

CBO

Share:

https://www.aikido.dev/blog/introducing-aikido-ai-cloud-search

Table of contents:
Text Link
Share:
Use keyboard
Use left key to navigate previous on Aikido slider
Use right arrow key to navigate to the next slide
to navigate through articles
By
Mackenzie Jackson

Reducing Cybersecurity Debt with AI Autotriage

Product & Company Updates
May 21, 2025
Read more
By
Mackenzie Jackson

Understanding SBOM Standards: A Look at CycloneDX, SPDX, and SWID

Guides & Best Practices
May 20, 2025
Read more
By
Mackenzie Jackson

Vibe Check: The vibe coder’s security checklist

Guides & Best Practices
May 19, 2025
Read more
By
Charlie Eriksen

You're Invited: Delivering malware via Google Calendar invites and PUAs

Vulnerabilities & Threats
May 13, 2025
Read more
By
Charlie Eriksen

RATatouille: A Malicious Recipe Hidden in rand-user-agent (Supply Chain Compromise)

Vulnerabilities & Threats
May 6, 2025
Read more
By
Charlie Eriksen

XRP supply chain attack: Official NPM package infected with crypto stealing backdoor

Vulnerabilities & Threats
April 22, 2025
Read more
By
Charlie Eriksen

The malware dating guide: Understanding the types of malware on NPM

Vulnerabilities & Threats
April 10, 2025
Read more
By
Charlie Eriksen

Hide and Fail: Obfuscated Malware, Empty Payloads, and npm Shenanigans

Vulnerabilities & Threats
April 3, 2025
Read more
By
Mackenzie Jackson

Why Lockfiles Matter for Supply Chain Security

Guides & Best Practices
April 1, 2025
Read more
By
Madeline Lawrence

Launching Aikido Malware – Open Source Threat Feed

Product & Company Updates
March 31, 2025
Read more
By
Charlie Eriksen

Malware hiding in plain sight: Spying on North Korean Hackers

Vulnerabilities & Threats
March 31, 2025
Read more
By
Madeline Lawrence

Get the TL;DR: tj-actions/changed-files Supply Chain Attack

Vulnerabilities & Threats
March 16, 2025
Read more
By
Mackenzie Jackson

A no-BS Docker security checklist for the vulnerability-minded developer

Guides & Best Practices
March 6, 2025
Read more
By
Mackenzie Jackson

Sensing and blocking JavaScript SQL injection attacks

Guides & Best Practices
March 4, 2025
Read more
By
Floris Van den Abeele

Prisma and PostgreSQL vulnerable to NoSQL injection? A surprising security risk explained

Vulnerabilities & Threats
February 14, 2025
Read more
By
Willem Delbare

Launching Opengrep | Why we forked Semgrep

Product & Company Updates
January 24, 2025
Read more
By
Thomas Segura

Your Client Requires NIS2 Vulnerability Patching. Now What?

Guides & Best Practices
January 14, 2025
Read more
By
Mackenzie Jackson

The Startup's Open-Source Guide to Application Security

Guides & Best Practices
December 23, 2024
Read more
By
Madeline Lawrence

Launching Aikido for Cursor AI

Product & Company Updates
December 13, 2024
Read more
By
Mackenzie Jackson

Meet Intel: Aikido’s Open Source threat feed powered by LLMs.

Product & Company Updates
December 13, 2024
Read more
By
Johan De Keulenaer

Aikido joins the AWS Partner Network

Product & Company Updates
November 26, 2024
Read more
By
Mackenzie Jackson

Command injection in 2024 unpacked

Vulnerabilities & Threats
November 24, 2024
Read more
By
Mackenzie Jackson

Path Traversal in 2024 - The year unpacked

Vulnerabilities & Threats
November 23, 2024
Read more
By
Mackenzie Jackson

Balancing Security: When to Leverage Open-Source Tools vs. Commercial Tools

Guides & Best Practices
November 15, 2024
Read more
By
Mackenzie Jackson

The State of SQL Injection

Vulnerabilities & Threats
November 8, 2024
Read more
By
Michiel Denis

Visma’s Security Boost with Aikido: A Conversation with Nikolai Brogaard

Customer Stories
November 6, 2024
Read more
By
Michiel Denis

Security in FinTech: Q&A with Dan Kindler, co-founder & CTO of Bound

Customer Stories
October 10, 2024
Read more
By
Madeline Lawrence

Automate compliance with SprintoGRC x Aikido

Product & Company Updates
September 11, 2024
Read more
By
Madeline Lawrence

SAST vs DAST: What you need to know.

Guides & Best Practices
September 2, 2024
Read more
By
Lieven Oosterlinck

5 Snyk Alternatives and Why They Are Better

DevSec Tools & Comparisons
August 5, 2024
Read more
By
Madeline Lawrence

Why we’re stoked to partner with Laravel

Product & Company Updates
July 8, 2024
Read more
By
Felix Garriau

110,000 sites affected by the Polyfill supply chain attack

Vulnerabilities & Threats
June 27, 2024
Read more
By
Felix Garriau

Cybersecurity Essentials for LegalTech Companies

Guides & Best Practices
June 25, 2024
Read more
By
Roeland Delrue

Drata Integration - How to Automate Technical Vulnerability Management

Product & Company Updates
June 18, 2024
Read more
By
Joel Hans

DIY guide: ‘Build vs buy’ your OSS code scanning and app security toolkit

Guides & Best Practices
June 11, 2024
Read more
By
Roeland Delrue

SOC 2 certification: 5 things we learned

Compliance
June 4, 2024
Read more
By
Joel Hans

Top 10 app security problems and how to protect yourself

Guides & Best Practices
May 28, 2024
Read more
By
Madeline Lawrence

We just raised our $17 million Series A

Product & Company Updates
May 2, 2024
Read more
By
Willem Delbare

Webhook security checklist: How to build secure webhooks

Guides & Best Practices
April 4, 2024
Read more
By
Willem Delbare

The Cure For Security Alert Fatigue Syndrome

Guides & Best Practices
February 21, 2024
Read more
By
Roeland Delrue

NIS2: Who is affected?

Compliance
January 16, 2024
Read more
By
Roeland Delrue

ISO 27001 certification: 8 things we learned

Compliance
December 5, 2023
Read more
By
Roeland Delrue

Cronos Group chooses Aikido Security to strengthen security posture for its companies and customers

Customer Stories
November 30, 2023
Read more
By
Bart Jonckheere

How Loctax uses Aikido Security to get rid of irrelevant security alerts & false positives

Customer Stories
November 22, 2023
Read more
By
Felix Garriau

Aikido Security raises €5m to offer a seamless security solution to growing SaaS businesses

Product & Company Updates
November 9, 2023
Read more
By
Roeland Delrue

Aikido Security achieves ISO 27001:2022 compliance

Product & Company Updates
November 8, 2023
Read more
By
Felix Garriau

How StoryChief’s CTO uses Aikido Security to sleep better at night

Customer Stories
October 24, 2023
Read more
By
Willem Delbare

What is a CVE?

Vulnerabilities & Threats
October 17, 2023
Read more
By
Willem Delbare

Top 3 web application security vulnerabilities in 2024

Vulnerabilities & Threats
September 27, 2023
Read more
By
Felix Garriau

New Aikido Security Features: August 2023

Product & Company Updates
August 22, 2023
Read more
By
Felix Garriau

Aikido’s 2025 SaaS CTO Security Checklist

Guides & Best Practices
August 10, 2023
Read more
By
Felix Garriau

Aikido’s 2024 SaaS CTO Security Checklist

Guides & Best Practices
August 10, 2023
Read more
By
Felix Garriau

15 Top Cloud and Code Security Challenges Revealed by CTOs

Guides & Best Practices
July 25, 2023
Read more
By
Willem Delbare

What is OWASP Top 10?

Vulnerabilities & Threats
July 12, 2023
Read more
By
Willem Delbare

How to build a secure admin panel for your SaaS app

Guides
July 11, 2023
Read more
By
Roeland Delrue

How to prepare yourself for ISO 27001:2022

Guides
July 5, 2023
Read more
By
Willem Delbare

Preventing fallout from your CI/CD platform being hacked

Guides
June 19, 2023
Read more
By
Felix Garriau

How to Close Deals Faster with a Security Assessment Report

News
June 12, 2023
Read more
By
Willem Delbare

Automate Technical Vulnerability Management [SOC 2]

Guides
June 5, 2023
Read more
By
Willem Delbare

Preventing prototype pollution in your repository

Guides & Best Practices
June 1, 2023
Read more
By
Willem Delbare

How does a SaaS startup CTO balance development speed and security?

Guides
May 16, 2023
Read more
By
Willem Delbare

How a startup’s cloud got taken over by a simple form that sends emails

Engineering
April 10, 2023
Read more
By
Felix Garriau

Aikido Security raises €2 million pre-seed round to build a developer-first software security platform

News
January 19, 2023
Read more
Mend.io Not Cutting It? Here Are Better SCA Alternatives
By
The Aikido Team

Mend.io Not Cutting It? Here Are Better SCA Alternatives

DevSec Tools & Comparisons
May 28, 2025
Best Static Code Analysis Tools Like Semgrep
By
The Aikido Team

Best Static Code Analysis Tools Like Semgrep

DevSec Tools & Comparisons
May 28, 2025
From Code to Cloud: Best Tools Like Cycode for End-to-End Security
By
The Aikido Team

From Code to Cloud: Best Tools Like Cycode for End-to-End Security

DevSec Tools & Comparisons
May 28, 2025

Get secure for free

Secure your code, cloud, and runtime in one central system.
Find and fix vulnerabilities fast automatically.

Start for Free
No CC required
Book a demo
No credit card required |Scan results in 32secs.
Company
ProductPricingAboutCareersContactPartner with us
Resources
DocsPublic API DocsVulnerability DatabaseBlogIntegrationsGlossaryPress KitCustomer Reviews
Security
Trust CenterSecurity OverviewChange Cookie Preferences
Legal
Privacy PolicyCookie PolicyTerms of UseMaster Subscription AgreementData Processing Agreement
Use Cases
ComplianceSAST & DASTASPMVulnerability ManagementGenerate SBOMsWordPress SecuritySecure Your CodeAikido for Microsoft
Industries
For HealthTechFor MedTechFor FinTechFor SecurityTechFor LegalTechFor HRTechFor AgenciesFor EnterpriseFor PE & Group Companies
Compare
vs All Vendorsvs Snykvs Wizvs Mendvs Orca Securityvs Veracodevs GitHub Advanced Securityvs GitLab Ultimatevs Checkmarxvs Semgrepvs SonarQube
Connect
hello@aikido.dev
LinkedInX
Subscribe
Stay up to date with all updates
Not quite there yet.
👋🏻 Thank you! You’ve been subscribed.
Team Aikido
Not quite there yet.
© 2025 Aikido Security BV | BE0792914919
🇪🇺 Registered address: Coupure Rechts 88, 9000, Ghent, Belgium
🇪🇺 Office address: Gebroeders van Eyckstraat 2, 9000, Ghent, Belgium
🇺🇸 Office address: 95 Third St, 2nd Fl, San Francisco, CA 94103, US
SOC 2
Compliant
ISO 27001
Compliant