Vulnerabilities in Access Keys software