Hi Joe,
As Alessandro suggested, you need to run Access risk analysis reports on role level.
It will show you what exactly is the violation and at what level.. at action, permission, critical action, critical permission et al.
This report will even let you see the corresponding risk IDs, Rule IDs and risk criticality levels like medium/hig/critical and so.
Hope this is clear now
Regards,
Ameet