Skip to main content

Scan and visualize your AWS infrastructure as an interactive graph

Project description

CloudWire

AWS infrastructure visualization tool — scan your account and explore service dependencies as an interactive graph, directly in your browser.

PyPI version Python versions License: MIT Build

If CloudWire saves you time, a GitHub star helps others find it.

No data leaves your system. AWS credentials never leave your terminal. The graph is built locally using your existing credential chain (~/.aws/credentials, aws sso login, saml2aws, aws-vault — all work out of the box).

CloudWire — AWS infrastructure graph visualization


Quick start

# Install
pip install cloudwire

# Launch (opens http://localhost:8080 automatically)
cloudwire

# Target a specific profile and region
cloudwire --profile staging --region us-east-1

Tip: Prefer isolated installs? Use pipx install cloudwire instead.

Requirements: Python 3.9+ and valid AWS credentials configured locally.

On first load, select the services you want to scan from the top bar and click Scan. The graph populates in real time as resources are discovered.


Key features

  • Interactive graph — dark-themed canvas with animated data flow, pan/zoom, and SVG export
  • 24 AWS services with dedicated scanners, icons, colors, and relationship inference
  • Real edges — API integrations, event triggers, IAM policy inference, env var references, VPC containment
  • VPC topology — subnets, security groups, IGWs, NAT GWs, route tables with AZ grouping and internet exposure detection
  • Tag-based scanning — discover and scan resources by AWS tags
  • Terraform import — upload .tfstate or .tf files to visualize without AWS credentials
  • Analysis tools — blast radius, shortest path, architecture summary, pattern detection
  • Three layout modes — Circular, Flow, Swimlane — switchable from the toolbar
  • Permission-aware — missing IAM policies surfaced clearly, never blocks the scan

Required IAM permissions

CloudWire is read-only. All operations use List*, Describe*, and Get* API actions only — no write access required.

A minimal IAM policy is documented in docs/USAGE.md. The recommended starting point:

arn:aws:iam::aws:policy/ReadOnlyAccess

If you use a more restrictive policy, CloudWire will scan what it can and clearly report which services were denied — it never fails silently.


Supported services

Service Scanner
API Gateway Dedicated — REST + HTTP APIs, multi-service integrations, Cognito authorizers
Lambda Dedicated — functions, event source mappings, env var references, IAM policy inference
SQS Dedicated — queues, attributes, dead letter queue edges
SNS Dedicated — topics and subscriptions
EventBridge Dedicated — rules and targets
DynamoDB Dedicated — tables, streams, global table replicas
EC2 Dedicated — instances, VPC, subnet, security group, instance profile edges
ECS Dedicated — clusters, services, task definitions, load balancer edges
S3 Dedicated — buckets and Lambda notification edges
RDS Dedicated — DB instances and clusters
Step Functions Dedicated
Kinesis Dedicated
IAM Dedicated — roles with full policy resolution
Cognito Dedicated — user pools
CloudFront Dedicated — distributions, S3/API GW/ELB origins, Lambda@Edge
Route 53 Dedicated — hosted zones, record sets, alias target edges
ElastiCache Dedicated — cache clusters
Redshift Dedicated — clusters
Glue Dedicated — jobs, crawlers, triggers
AppSync Dedicated — GraphQL APIs
Secrets Manager Dedicated
KMS Dedicated
VPC Network Dedicated — VPCs, subnets, security groups, IGWs, NAT GWs, route tables
ELB Discovered via CloudFront, Route 53, ECS edges
Everything else Generic (tagged resources only)

How it works

CloudWire is a Python CLI (FastAPI backend) that serves a pre-compiled React frontend. The backend scans AWS via boto3 and builds a networkx graph. The frontend visualizes it using a custom SVG canvas engine. No database, no cloud dependency — everything runs in a single process on your machine.


Contributing

We welcome contributions! See CONTRIBUTING.md for setup instructions, project structure, code style, and PR guidelines.

git clone https://github.com/Himanshu-370/cloudwire
cd cloudwire
make dev   # starts backend + frontend in parallel

Links

License

MIT — see LICENSE.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

cloudwire-0.2.6.tar.gz (160.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

cloudwire-0.2.6-py3-none-any.whl (179.3 kB view details)

Uploaded Python 3

File details

Details for the file cloudwire-0.2.6.tar.gz.

File metadata

  • Download URL: cloudwire-0.2.6.tar.gz
  • Upload date:
  • Size: 160.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for cloudwire-0.2.6.tar.gz
Algorithm Hash digest
SHA256 728cf45638abb1fa34acc1380f79bda6bc2d8d3824b4b84aeb543ca916bdd756
MD5 dc0ca8cb5ddfcd4cc0702bf6a5b8be60
BLAKE2b-256 b396b41f3d8c76ca66465cc8551d760dfee3e63e8252dcbcf7f69696d008796f

See more details on using hashes here.

File details

Details for the file cloudwire-0.2.6-py3-none-any.whl.

File metadata

  • Download URL: cloudwire-0.2.6-py3-none-any.whl
  • Upload date:
  • Size: 179.3 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for cloudwire-0.2.6-py3-none-any.whl
Algorithm Hash digest
SHA256 225203885374c967150d3a49a687befd0c262124e0bb1e5eee5db34b57f1487b
MD5 d548f31d5ea7c896fa4255a36d283692
BLAKE2b-256 59356ff1837d9d757e088a0f94837bfef6ab39f2b0671aeeb5e3c029fcaffc8f

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page