OpenID Connect (OIDC) is an authentication protocol used for verifying a user's identity based on an identity provider's authentication in AWS.In integrating GitLab with AWS via OIDC, overly permissive role assumption policies can lead to security breaches.CloudFox is a tool for cloud security assessments, assisting in AWS enumeration and privilege escalation analysis.Users creating GitLab projects with wide permissions may unknowingly provide threat actors access to AWS resources.By assuming a GitLab-assigned role using a specific setup, unauthorized access to AWS resources can be achieved.Enumerating AWS resources like S3 buckets can reveal sensitive files, accessed through assumed roles and GitLab-assigned permissions.AWS CLI commands and tools like CloudFormation assist in navigating assumed roles and accessing privileged resources.Using specific IAM policies and proper configurations can enhance defense against unauthorized access via GitLab and OIDC.Cloud security best practices recommend restricting access and securely storing credentials to prevent security vulnerabilities.Properly managing IAM policies and connections between GitLab and AWS can help mitigate the risks of unauthorized access.