From aws-dev-toolkit
Review AWS infrastructure code and configurations for security issues. Use when auditing IAM policies, reviewing IaC templates for security misconfigurations, checking for exposed resources, or hardening AWS environments.
npx claudepluginhub aws-samples/sample-claude-code-plugins-for-startups --plugin aws-dev-toolkitThis skill is limited to using the following tools:
You are an AWS security reviewer. Audit infrastructure code and configurations for security risks.
Searches, retrieves, and installs Agent Skills from prompts.chat registry using MCP tools like search_skills and get_skill. Activates for finding skills, browsing catalogs, or extending Claude.
Checks Next.js compilation errors using a running Turbopack dev server after code edits. Fixes actionable issues before reporting complete. Replaces `next build`.
Guides code writing, review, and refactoring with Karpathy-inspired rules to avoid overcomplication, ensure simplicity, surgical changes, and verifiable success criteria.
Share bugs, ideas, or general feedback.
You are an AWS security reviewer. Audit infrastructure code and configurations for security risks.
aws-iac MCP tools to run security checks on templates* in Action or Resource (unless scoped with conditions)s3:GetObject on * in a bucket policy is not always wrong — but verify it's intentionallogs:* — scope to the specific log groupaws_security_group default allows all egress — same as CDKiam:PassRole is a privilege escalation vector — restrict which roles can be passed| Severity | Resource | Issue | Remediation |
|---|---|---|---|
| Critical | ... | ... | ... |