From asi
Detects unusual API call patterns in AWS CloudTrail logs using boto3, statistical baselining, and behavioral analysis to identify credential compromise, privilege escalation, and unauthorized access. Useful for security incident investigations and threat hunting.
npx claudepluginhub plurigrid/asi --plugin asiThis skill uses the workspace's default tool permissions.
AWS CloudTrail records API calls across AWS services. This skill covers querying CloudTrail events with boto3's `lookup_events` API, building statistical baselines of normal API activity, detecting anomalies such as unusual event sources, geographic anomalies, high-frequency API calls, and first-time API usage patterns that indicate compromised credentials or insider threats.
Detects anomalies in AWS CloudTrail logs using boto3, statistical baselining, and behavioral analysis to flag credential compromise, privilege escalation, and unauthorized access.
Detects anomalous API call patterns in AWS CloudTrail logs using boto3, statistical baselines, and behavioral analysis to identify credential intrusion, privilege escalation, and unauthorized access.
Implements AWS CloudTrail log analysis using Athena, CloudWatch Logs Insights, and SIEM for security monitoring, threat detection, and forensic investigation of unauthorized access and suspicious API activity.
Share bugs, ideas, or general feedback.
AWS CloudTrail records API calls across AWS services. This skill covers querying CloudTrail events with boto3's lookup_events API, building statistical baselines of normal API activity, detecting anomalies such as unusual event sources, geographic anomalies, high-frequency API calls, and first-time API usage patterns that indicate compromised credentials or insider threats.
boto3 libraryUse boto3 CloudTrail client's lookup_events to retrieve recent API activity with pagination.
Aggregate events by user, source IP, event source, and event name to establish normal behavior patterns.
Flag unusual patterns: new event sources per user, first-time API calls, geographic IP changes, high error rates, and sensitive API usage (IAM, KMS, S3 policy changes).
Produce a JSON report with anomaly scores, top suspicious users, and recommended investigation actions.
JSON report with event statistics, baseline deviations, anomalous users/IPs, sensitive API calls, and error rate analysis.