npx claudepluginhub diegouis/provectus-marketplace --plugin proagent-aws-aiDefined in hooks/hooks.json
Bashwhich jq >/dev/null 2>&1 || exit 0; jq -r '.tool_input.command // empty' | { read cmd; if echo "$cmd" | grep -qiE 'aws.*delete|aws.*remove|aws.*terminate|cdk destroy'; then echo '[proagent-aws-ai] Destructive AWS operation detected. Verify this is intentional and targeting the correct environment.' >&2; exit 2; fi; }10mswhich jq >/dev/null 2>&1 || exit 0; jq -r '.tool_input.command // empty' | { read cmd; if echo "$cmd" | grep -qiE 'cdk deploy|cdk synth|aws cloudformation|terraform apply'; then echo '[proagent-aws-ai] Infrastructure deployment detected. Ensure IAM roles follow least privilege, VPC is configured, resource tags are applied, and Guardrails are enabled.'; fi; }10msBashwhich jq >/dev/null 2>&1 || exit 0; jq -r '.tool_input.command // empty' | { read cmd; if echo "$cmd" | grep -qiE 'cdk deploy|aws cloudformation create|terraform apply'; then echo '[proagent-aws-ai] Infrastructure deployed. Verify CloudWatch dashboards, AgentCore Observability, and cost allocation tags are configured.'; fi; }10msWritewhich jq >/dev/null 2>&1 || exit 0; jq -r '.tool_input.file_path // empty' | { read fp; if echo "$fp" | grep -qiE '\.(ts|py|yaml|yml|json)$' && echo "$fp" | grep -qiE 'cdk|stack|template|bedrock|agent|mcp'; then echo '[proagent-aws-ai] AWS AI infrastructure code written. Verify Well-Architected compliance: IAM least privilege, VPC isolation, Guardrails, observability, and cost tags.'; fi; }10msBlocks unsafe git ops like main commits, unverified pushes, blanket adds, branch deletes, and root/main edits via PreToolUse bash hooks on Bash/Edit tools. Warns risks, reminds CI, watches deploys post-push.
Share bugs, ideas, or general feedback.