A powerful CLI tool for auditing AWS cloud infrastructure. Find cost savings, security issues, and optimization opportunities across your entire AWS account.
Version: 1.0.0
NEBU SCAN analyzes your AWS account and gives you actionable insights about:
- Cost Waste - Find underutilized resources, idle instances, and opportunities to save money
- Security Issues - Detect misconfigurations, public resources, and security vulnerabilities
- Optimization - Get recommendations for rightsizing, better configurations, and best practices
Currently supports 50+ AWS services including EC2, RDS, S3, Lambda, ECS, DynamoDB, and more.
Download the binary for your operating system from the releases page.
curl -L https://github.com/THE-NEBU/NEBU-SCAN/releases/latest/download/nebu-linux-amd64 -o nebu
chmod +x nebu
sudo mv nebu /usr/local/bin/curl -L https://github.com/THE-NEBU/NEBU-SCAN/releases/latest/download/nebu-darwin-amd64 -o nebu
chmod +x nebu
sudo mv nebu /usr/local/bin/curl -L https://github.com/THE-NEBU/NEBU-SCAN/releases/latest/download/nebu-darwin-arm64 -o nebu
chmod +x nebu
sudo mv nebu /usr/local/bin/Option 1: Quick Install (Recommended)
- Download
nebu-windows-amd64.exefrom the releases page - Rename it to
nebu.exe - Move it to
C:\Program Files\NEBU\ - Add to PATH:
Using PowerShell (Run as Administrator):
# Create directory
New-Item -Path "C:\Program Files\NEBU" -ItemType Directory -Force
# Move the downloaded file
Move-Item -Path "$env:USERPROFILE\Downloads\nebu-windows-amd64.exe" -Destination "C:\Program Files\NEBU\nebu.exe"
# Add to PATH permanently
[Environment]::SetEnvironmentVariable("Path", $env:Path + ";C:\Program Files\NEBU", "Machine")
# Verify installation (open a new PowerShell window)
nebu --helpManual PATH Setup:
- Search for "Environment Variables" in Windows Start Menu
- Click "Environment Variables"
- Under "System Variables", find "Path" and click "Edit"
- Click "New" and add:
C:\Program Files\NEBU - Click "OK" on all windows
- Open a new Command Prompt or PowerShell and type
nebu --help
You need AWS credentials configured on your machine. NEBU SCAN uses the same credentials as the AWS CLI.
# Make sure you have AWS CLI configured
aws configure
# Or use AWS SSO
aws sso login --profile your-profileRequired IAM Permissions: NEBU SCAN needs read-only access to your AWS resources. We recommend using the AWS managed policy ReadOnlyAccess or creating a custom policy with describe/list/get permissions.
Option 1: Interactive Mode (Easiest)
Just run nebu and it will guide you through the options:
nebuThis will ask you:
- Which cloud provider (AWS)
- What to scan (Waste or Security)
- AWS profile to use
- Region (leave empty for all regions)
- Whether to include resources covered by Reserved Instances/Savings Plans
Option 2: Direct Commands
# Scan for cost waste in all regions
nebu aws waste your-profile exclude
# Scan for waste in a specific region
nebu aws waste your-profile exclude us-east-1
# Run security audit on all regions
nebu aws security your-profile
# Run security audit on specific region
nebu aws security your-profile us-west-2This scans your AWS resources and finds opportunities to save money.
Basic syntax:
nebu aws waste <aws-profile> <exclude|include> [region]Parameters:
aws-profile: The AWS profile name from your~/.aws/credentialsfile (e.g., "default", "production", "staging")exclude|include:exclude- Only show resources NOT covered by Reserved Instances or Savings Plans (recommended)include- Show all resources including those covered by RI/SP
region(optional): AWS region to scan (e.g., "us-east-1"). Leave empty to scan all regions.
Examples:
# Scan production account, all regions, exclude RI/SP covered resources
nebu aws waste production exclude
# Scan only us-east-1
nebu aws waste production exclude us-east-1
# Include all resources (even RI/SP covered)
nebu aws waste production includeWhat you'll get:
- Total monthly waste amount
- List of optimization opportunities sorted by potential savings
- Each opportunity includes:
- Resource ID and service
- Current vs recommended configuration
- Estimated monthly savings
- Implementation complexity (how hard it is to fix)
- Step-by-step remediation guide
This scans for security vulnerabilities and misconfigurations.
Basic syntax:
nebu aws security <aws-profile> [region]Parameters:
aws-profile: The AWS profile nameregion(optional): AWS region to scan. Leave empty for all regions.
Examples:
# Scan all regions for security issues
nebu aws security production
# Scan only eu-west-1
nebu aws security production eu-west-1What you'll get:
- Total number of security findings
- Findings categorized by severity (Critical, High, Medium, Low)
- Details for each finding including:
- What the issue is
- Why it's a problem
- How to fix it
- Affected resource
Security checks include:
- IAM: Overly permissive policies, MFA gaps, inactive credentials, admin users
- S3: Public buckets, unencrypted data, insecure bucket policies
- EC2: Public instances, security group misconfigurations, IMDSv2 not enforced
- RDS: Publicly accessible databases, unencrypted data, backup issues
# Show help
nebu help
nebu --help
# Show version
nebu --version
# Interactive mode
nebu
# Waste scans
nebu aws waste <profile> exclude # All regions, exclude RI/SP
nebu aws waste <profile> exclude <region> # Single region, exclude RI/SP
nebu aws waste <profile> include # All regions, include RI/SP
nebu aws waste <profile> include <region> # Single region, include RI/SP
# Security scans
nebu aws security <profile> # All regions
nebu aws security <profile> <region> # Single region
# Telemetry management
nebu telemetry status # Check if telemetry is enabled
nebu telemetry enable # Enable usage tracking
nebu telemetry disable # Disable usage trackingCompute:
- EC2 - Rightsizing, stopped instances, underutilized instances
- ECS - Idle clusters, oversized tasks
- EKS - Underutilized node groups
- Lambda - Oversized functions, unused functions
- EMR - Idle clusters
Storage:
- EBS - Unattached volumes, over-provisioned volumes, old snapshots
- S3 - Storage class optimization, incomplete multipart uploads
- EFS - Underutilized file systems
- FSx - Idle file systems
Database:
- RDS - Oversized instances, stopped instances, idle databases
- DynamoDB - Over-provisioned throughput
- ElastiCache - Underutilized clusters
- Redshift - Idle clusters, oversized clusters
- DocumentDB - Underutilized clusters
Networking:
- NAT Gateway - Idle NAT gateways, data transfer optimization
- Load Balancers - Idle load balancers (ALB, NLB, Classic)
- VPC - Unused resources
- Transit Gateway - Underutilized attachments
Data & Analytics:
- Glue - Unused jobs and crawlers
- Kinesis - Over-provisioned streams
AI/ML:
- SageMaker - Idle notebook instances and endpoints
Other:
- Backup - Excessive backup retention
- CloudWatch - Log retention optimization
- KMS - Unused keys
- Route53 - Unused hosted zones
- SNS/SQS - Idle topics and queues
IAM (15+ security checks)
- Users with admin access
- MFA not enabled
- Inactive credentials
- Overly permissive policies
- Password policy issues
- Root account usage
S3 (10+ security checks)
- Public buckets
- Unencrypted buckets
- Versioning not enabled
- Access logging disabled
- Insecure bucket policies
EC2 (8+ security checks)
- Public instances
- Security groups allowing 0.0.0.0/0
- IMDSv2 not enforced
- Public snapshots
- Unencrypted volumes
RDS (12+ security checks)
- Publicly accessible databases
- Unencrypted databases
- Automatic backups disabled
- Deletion protection disabled
- Multi-AZ not enabled
SUMMARY
Total Monthly Waste: $4,250.50
Opportunities Found: 318
Regions Scanned: 17
Scan Duration: 8m45s
BY BUSINESS IMPACT
● CRITICAL: 25 opportunities → $1,850.25/month
● HIGH: 48 opportunities → $1,420.75/month
● MEDIUM: 156 opportunities → $820.50/month
● LOW: 89 opportunities → $159.00/month
The Business Impact tells you how easy/hard it is to implement:
- CRITICAL - Very easy, low risk (5-15 minutes)
- HIGH - Easy, some planning needed (30-60 minutes)
- MEDIUM - Moderate effort, testing required (2-4 hours)
- LOW - Significant effort, careful planning needed (1+ day)
SUMMARY
Regions Scanned: 17
Total Findings: 672
Scan Duration: 2m18s
FINDINGS BY SEVERITY
● CRITICAL: 59 findings
● HIGH: 126 findings
● MEDIUM: 336 findings
● LOW: 151 findings
Severity Levels:
- CRITICAL - Immediate security risk, fix ASAP
- HIGH - Significant risk, should fix soon
- MEDIUM - Moderate risk, plan to address
- LOW - Minor risk or best practice
NEBU SCAN collects anonymous usage data to help us improve the tool. This is opt-in and you can disable it anytime.
What we collect:
- Anonymous installation ID (random UUID)
- CLI version, operating system
- Scan duration and number of regions scanned
- Number of findings by severity level
- Total savings amount
What we DON'T collect:
- Your AWS account ID or any credentials
- Resource names, IDs, ARNs, or any identifiers
- IP addresses
- Any personal information
To manage telemetry:
nebu telemetry status # See current status
nebu telemetry enable # Enable
nebu telemetry disable # DisableQ: Is it safe to use in production? A: Yes! NEBU SCAN only performs read-only operations. It never modifies your infrastructure.
Q: How long does a scan take? A: Single region: 2-5 minutes. All regions: 8-15 minutes. Depends on how many resources you have.
Q: Do I need special AWS permissions?
A: You need read-only access. Use the AWS managed policy ReadOnlyAccess or equivalent describe/list/get permissions.
Q: Can I scan multiple AWS accounts?
A: Yes! Just configure multiple profiles in ~/.aws/credentials and run NEBU SCAN for each profile.
Q: What's the difference between "exclude" and "include" for waste scans? A: "exclude" only shows resources you're actually paying for (not covered by Reserved Instances or Savings Plans). This gives you actionable opportunities. "include" shows everything, even resources already optimized with RI/SP.
Q: How accurate are the savings estimates? A: Very accurate. We use actual AWS pricing APIs and CloudWatch metrics. Estimates are conservative (we'd rather underestimate than overestimate).
Q: Does NEBU SCAN work with AWS Organizations? A: You need to run it separately for each account. Configure different AWS profiles for each account.
Q: Can I export the results? A: The CLI shows results in your terminal. For detailed reports and historical tracking, create a free account at report.thenebu.com.
Want more features? Create a free account at report.thenebu.com/register.
You get:
- Historical tracking of savings and security posture
- Share reports with your team
- Compliance reports (SOC2, HIPAA, PCI-DSS)
- Detailed remediation guides
- Benchmarking against similar companies
Error: "Unable to locate credentials"
- Make sure you've run
aws configureor have AWS credentials set up - Check that your profile name is correct
Error: "Access Denied"
- Your AWS user/role needs read-only permissions
- Add the
ReadOnlyAccesspolicy to your IAM user/role
Scan is very slow
- This is normal if you have lots of resources
- You can scan a single region first to see results faster
No opportunities found
- Great! Your infrastructure is well-optimized
- Try running a security audit instead
- AWS cost waste optimization
- AWS security audits
- GCP support
- Azure support
- Compliance checking (CIS, SOC2, HIPAA)
- Automated remediation
- Cost forecasting
Need help? Reach out:
- Email: dev@thenebu.com
- Website: https://thenebu.com
- GitHub Issues: https://github.com/THE-NEBU/NEBU-SCAN/issues
Proprietary software. All rights reserved.
This is closed-source software provided as compiled binaries only. You may not redistribute, modify, reverse engineer, or create derivative works.
Copyright © 2025 NEBU
Made with ❤️ by the NEBU team

