Skip to content

Warnings and Disclaimers

Spencer Gietzen edited this page Sep 14, 2018 · 8 revisions

Modules which make changes to target environments

Many Pacu modules make changes to the target AWS environment, but not all of those modules include a cleanup function to undo those changes. When attacking an environment with Pacu, be sure to clean up as necessary to try and keep the environment in the same state that it started in when you are finished.

Disclaimers

  • To the best of our knowledge Pacu's capabilities are compliant with the AWS Acceptable Use Policy, but as a flexible and modular tool we cannot guarantee this will be true in every situation. It is entirely your responsibility to ensure that how you use Pacu is compliant with the AWS Acceptable Use Policy.
  • Depending on what AWS services you use and what your planned testing entails, you may need to request authorization from Amazon prior to actually running Pacu against your infrastructure. Determining whether or not such authorization is necessary is your responsibility.
  • As with any cybersecurity tool, it is your responsibility to make sure you are fully authorized to access the computer systems and networks against which Pacu is being run.
  • Pacu is software that comes with absolutely no warranties whatsoever. By using Pacu, you take full responsibility for any and all outcomes that result.