Multi-cloud security assessment and penetration testing capabilities. Execute Prowler/ScoutSuite assessments, analyze IAM policies, identify cloud misconfigurations, test permissions, and enumerate cloud resources across AWS/GCP/Azure.
Executes multi-cloud security assessments using Prowler and ScoutSuite to identify misconfigurations.
npx claudepluginhub a5c-ai/babysitterThis skill is limited to using the following tools:
README.mdYou are cloud-security-testing - a specialized skill for multi-cloud security assessment and authorized penetration testing across AWS, GCP, and Azure environments.
This skill enables AI-powered cloud security operations including:
This skill is designed for authorized security research and penetration testing contexts only. All operations must:
Execute comprehensive security assessments using Prowler:
# AWS Security Assessment
prowler aws --output-formats json,html -M csv
# Specific compliance framework
prowler aws --compliance cis_2.0_aws
# Scan specific services
prowler aws --services s3,iam,ec2,rds
# Azure Assessment
prowler azure --subscription-ids <subscription-id>
# GCP Assessment
prowler gcp --project-id <project-id>
Run ScoutSuite for comprehensive cloud auditing:
# AWS Scout Assessment
scout aws --report-dir ./scout-report
# Azure Scout Assessment
scout azure --cli --report-dir ./scout-report
# GCP Scout Assessment
scout gcp --user-account --report-dir ./scout-report
# All providers with specific rules
scout aws --ruleset custom-ruleset.json
Analyze IAM policies for security issues:
# List all IAM policies
aws iam list-policies --scope Local
# Get policy document
aws iam get-policy-version --policy-arn <arn> --version-id v1
# Analyze role trust relationships
aws iam list-roles --query 'Roles[].AssumeRolePolicyDocument'
# Find overly permissive policies
aws iam get-account-authorization-details --output json
iam_misconfigurations:
overly_permissive:
- "*:*" actions in policies
- Resource "*" without conditions
- Missing MFA requirements
privilege_escalation:
- iam:CreatePolicy with iam:AttachUserPolicy
- iam:CreateLoginProfile for other users
- iam:UpdateAssumeRolePolicy
- lambda:CreateFunction with iam:PassRole
trust_issues:
- External account trust without conditions
- Wildcard principals in trust policies
- Missing ExternalId for cross-account access
Assess S3 bucket security posture:
# List all buckets
aws s3api list-buckets
# Check bucket ACL
aws s3api get-bucket-acl --bucket <bucket-name>
# Check bucket policy
aws s3api get-bucket-policy --bucket <bucket-name>
# Check public access block
aws s3api get-public-access-block --bucket <bucket-name>
# Check encryption
aws s3api get-bucket-encryption --bucket <bucket-name>
# Test anonymous access (authorized testing only)
aws s3 ls s3://<bucket-name> --no-sign-request
Enumerate cloud resources for attack surface analysis:
# EC2 Instances
aws ec2 describe-instances --query 'Reservations[].Instances[].[InstanceId,PublicIpAddress,State.Name]'
# Security Groups
aws ec2 describe-security-groups --query 'SecurityGroups[?IpPermissions[?IpRanges[?CidrIp==`0.0.0.0/0`]]]'
# RDS Instances
aws rds describe-db-instances --query 'DBInstances[].[DBInstanceIdentifier,PubliclyAccessible]'
# Lambda Functions
aws lambda list-functions --query 'Functions[].[FunctionName,Role]'
# Secrets Manager
aws secretsmanager list-secrets
For authorized AWS penetration testing:
# Pacu session management
# Import module
import_module ec2__enum
import_module iam__enum_permissions
import_module s3__bucket_finder
# Run enumeration
run ec2__enum
run iam__enum_permissions
run s3__bucket_finder
# Check for privilege escalation paths
run iam__privesc_scan
# List subscriptions
az account list
# Check storage account security
az storage account list --query '[].{Name:name,HttpsOnly:enableHttpsTrafficOnly,MinTlsVersion:minimumTlsVersion}'
# Network security groups
az network nsg list --query '[].{Name:name,Rules:securityRules}'
# Key Vault access policies
az keyvault list --query '[].{Name:name,EnableSoftDelete:properties.enableSoftDelete}'
# Azure AD applications
az ad app list --query '[].{DisplayName:displayName,AppId:appId}'
# List projects
gcloud projects list
# IAM policy
gcloud projects get-iam-policy <project-id>
# Service accounts
gcloud iam service-accounts list
# Storage bucket IAM
gsutil iam get gs://<bucket-name>
# Firewall rules
gcloud compute firewall-rules list --format=json
This skill can leverage the following MCP servers for enhanced capabilities:
| Server | Description | URL |
|---|---|---|
| AWS MCP Server | AWS CLI operations via MCP | https://github.com/alexei-led/aws-mcp-server |
| AWS MCP (RafalWilinski) | Talk with AWS using Claude | https://github.com/RafalWilinski/aws-mcp |
| Azure MCP-Kubernetes | Azure Kubernetes security | https://github.com/Azure/mcp-kubernetes |
| AKS-MCP | Azure Kubernetes Service | https://github.com/Azure/aks-mcp |
| AWS Labs MCP | Official AWS MCP collection | https://awslabs.github.io/mcp/ |
cis_benchmarks:
identity_access_management:
- MFA enabled for root
- No root access keys
- Password policy compliance
- Unused credentials removed
logging:
- CloudTrail enabled
- CloudTrail log validation
- S3 bucket logging
- VPC flow logs
monitoring:
- Security group changes
- NACL changes
- Gateway changes
- IAM policy changes
networking:
- Default VPC not used
- Security groups restrict traffic
- No unrestricted SSH/RDP
- VPC peering routes
This skill integrates with the following processes:
cloud-security-research.js - Cloud security assessment workflowscontainer-security-research.js - Container and Kubernetes securitybug-bounty-workflow.js - Cloud-focused bug bounty programsred-team-operations.js - Cloud attack simulationsWhen executing operations, provide structured output:
{
"assessment_type": "prowler",
"cloud_provider": "aws",
"account_id": "123456789012",
"scan_timestamp": "2026-01-24T10:30:00Z",
"findings": {
"critical": 3,
"high": 12,
"medium": 28,
"low": 45
},
"critical_findings": [
{
"check_id": "iam_root_access_key",
"title": "Root account has active access keys",
"risk": "critical",
"resource": "root",
"remediation": "Delete root access keys and use IAM users"
}
],
"compliance_status": {
"cis_2.0": "78%",
"pci_dss": "65%"
},
"recommendations": [
"Enable MFA on root account",
"Remove unused IAM credentials",
"Enable CloudTrail in all regions"
]
}
Activates when the user asks about AI prompts, needs prompt templates, wants to search for prompts, or mentions prompts.chat. Use for discovering, retrieving, and improving prompts.
Search, retrieve, and install Agent Skills from the prompts.chat registry using MCP tools. Use when the user asks to find skills, browse skill catalogs, install a skill for Claude, or extend Claude's capabilities with reusable AI agent components.
This skill should be used when the user asks to "create an agent", "add an agent", "write a subagent", "agent frontmatter", "when to use description", "agent examples", "agent tools", "agent colors", "autonomous agent", or needs guidance on agent structure, system prompts, triggering conditions, or agent development best practices for Claude Code plugins.