From magic-powers
Use when setting up AWS GuardDuty threat detection, managing findings, automating incident response, configuring multi-account setups, or understanding GuardDuty vs Inspector vs Security Hub. Covers AWS SCS-C02 detection and response domain.
npx claudepluginhub kienbui1995/magic-powers --plugin magic-powersThis skill uses the workspace's default tool permissions.
- Enabling and configuring AWS GuardDuty for threat detection
Generates design tokens/docs from CSS/Tailwind/styled-components codebases, audits visual consistency across 10 dimensions, detects AI slop in UI.
Records polished WebM UI demo videos of web apps using Playwright with cursor overlay, natural pacing, and three-phase scripting. Activates for demo, walkthrough, screen recording, or tutorial requests.
Delivers idiomatic Kotlin patterns for null safety, immutability, sealed classes, coroutines, Flows, extensions, DSL builders, and Gradle DSL. Use when writing, reviewing, refactoring, or designing Kotlin code.
GuardDuty continuously analyzes these sources for threats:
| Data Source | What It Detects | Enabled By Default |
|---|---|---|
| AWS CloudTrail management events | API call anomalies, suspicious CLI/console activity | Yes |
| AWS CloudTrail S3 data events | Suspicious S3 object access patterns | Optional (S3 Protection) |
| VPC Flow Logs | Network anomalies, port scanning, crypto mining traffic | Yes |
| DNS logs | DNS-based data exfiltration, C2 communication | Yes (EC2 only, via AWS DNS resolver) |
| EKS audit logs | Suspicious Kubernetes API activity, privilege escalation | Optional (EKS Protection) |
| ECS runtime | Container-level threat detection | Optional (ECS Runtime Monitoring) |
| Lambda network activity | Suspicious outbound network calls from Lambda | Optional (Lambda Protection) |
| RDS login events | Brute force, anomalous authentication | Optional (RDS Protection) |
| Malware Protection | Malware in EC2 EBS volumes or uploaded S3 objects | Optional |
GuardDuty does NOT require you to enable VPC Flow Logs or CloudTrail separately โ it accesses these directly without storing logs in your account.
Format: ThreatPurpose:ResourceAffected/ThreatFamilyName.DetectionMechanism!Artifact
| Category | Example Finding | Meaning |
|---|---|---|
| Reconnaissance | Recon:EC2/PortProbeUnprotectedPort | Port scanning on EC2 |
| Backdoor | Backdoor:EC2/C&CActivity.B | EC2 communicating with known C2 server |
| CryptoCurrency | CryptoCurrency:EC2/BitcoinTool.B | EC2 mining cryptocurrency |
| UnauthorizedAccess | UnauthorizedAccess:EC2/SSHBruteForce | SSH brute force attempts |
| UnauthorizedAccess | UnauthorizedAccess:IAMUser/TorIPCaller | API calls from Tor exit node |
| Stealth | Stealth:IAMUser/CloudTrailLoggingDisabled | CloudTrail disabled (cover tracks) |
| Policy | Policy:S3/BucketPublicAccessGranted | S3 bucket made public |
| Execution | Execution:EC2/MaliciousFile | Malware detected on EC2 |
| Exfiltration | Exfiltration:S3/ObjectRead.Unusual | Unusual volume of S3 reads |
| PenTest | PenTest:IAMUser/KaliLinux | API calls from Kali Linux machine |
Finding severity:
Administrator account = central visibility and control:
Setup via AWS Organizations (recommended):
Manual invitation method (non-Organizations):
Suppression rules: Filter known-safe findings by account, region, resource type, or finding type. Suppressions apply to future findings. Suppressed findings still stored but not active.
Pattern: GuardDuty finding โ EventBridge rule โ Lambda/SNS/SQS โ automated action
GuardDuty finding
โ
EventBridge rule (filter by severity, finding type)
โ
SNS topic โ email/Slack notification
Lambda function โ automated remediation
โ
Actions: block IP via NACL, isolate SG, disable IAM key, snapshot EBS
EventBridge rule for high-severity findings:
{
"source": ["aws.guardduty"],
"detail-type": ["GuardDuty Finding"],
"detail": {
"severity": [{"numeric": [">=", 7.0]}]
}
}
Common automated responses:
iam:UpdateAccessKeyS3 Protection:
Malware Protection for EC2:
Malware Protection for S3:
| Action | Effect | Use When |
|---|---|---|
| Suppress | Future matching findings not shown in active list | Known-safe activity that generates noise |
| Archive | Mark individual finding as reviewed/resolved | Investigated finding; not a real threat |
| Trust IP list | IP addresses that GuardDuty never generates findings for | Your pen test IP ranges, internal scanners |
| Threat IP list | IP addresses that GuardDuty always flags | Known bad IPs specific to your environment |