You can find websites using AWS bucket storage using this tool.
To upload your data (photos, videos, documents, etc.) to Amazon, you must first create a bucket in one of the AWS Regions. You can then upload any number of objects to the bucket.
If attackers detect the technology used, they will try to detect vulnerabilities related to this application.
Only use components that do not have known vulnerabilities, only use components that when combined to not introduce a security vulnerability, and ensure that a misconfiguration does not cause any vulnerabilities.