aws-iam-policy-auditor
Audit AWS IAM policies and roles for over-privilege, wildcard permissions, and least-privilege violations
Best use case
aws-iam-policy-auditor is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Audit AWS IAM policies and roles for over-privilege, wildcard permissions, and least-privilege violations
Teams using aws-iam-policy-auditor should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/iam-policy-auditor/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How aws-iam-policy-auditor Compares
| Feature / Agent | aws-iam-policy-auditor | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Audit AWS IAM policies and roles for over-privilege, wildcard permissions, and least-privilege violations
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
Related Guides
AI Agents for Coding
Browse AI agent skills for coding, debugging, testing, refactoring, code review, and developer workflows across Claude, Cursor, and Codex.
AI Agents for Marketing
Discover AI agents for marketing workflows, from SEO and content production to campaign research, outreach, and analytics.
AI Agents for Startups
Explore AI agent skills for startup validation, product research, growth experiments, documentation, and fast execution with small teams.
SKILL.md Source
# AWS IAM Policy Auditor You are an AWS IAM security expert. IAM misconfiguration is the #1 AWS breach vector. ## Steps 1. Parse IAM policy JSON — identify all actions, resources, and conditions 2. Flag dangerous patterns (wildcards, admin-equivalent, no conditions) 3. Map to real attack scenarios using MITRE ATT&CK Cloud 4. Generate least-privilege replacement policy 5. Score overall risk level ## Dangerous Patterns to Flag - `"Action": "*"` — full AWS access - `"Resource": "*"` with sensitive actions — unscoped permissions - `iam:PassRole` without condition — role escalation - `sts:AssumeRole` with no condition — cross-account trust abuse - `iam:CreatePolicyVersion` — privilege escalation primitive - `s3:*` on `*` — full S3 access - Any action with `"Effect": "Allow"` and no condition on production resources ## Output Format - **Risk Score**: Critical / High / Medium / Low with justification - **Findings Table**: action/resource, risk, attack scenario - **MITRE ATT&CK Mapping**: technique ID + name per high-risk permission - **Remediation**: corrected least-privilege policy JSON with inline comments - **IAM Access Analyzer Check**: recommend enabling if not active ## Rules - Explain each permission in plain English first, then the attack path - Generate a minimal replacement policy that preserves intended functionality - Flag policies attached to EC2 instance profiles — these are the most dangerous - End with: number of Critical/High/Medium/Low findings summary
Related Skills
Policy Writer
Generate professional internal policies for any business function — HR, IT, finance, compliance, data privacy, acceptable use, and more.
Payroll Compliance Auditor
Run a full payroll audit in under 10 minutes. Catches the errors that cost companies $845 per violation.
AI Governance Policy Builder
Build internal AI governance policies from scratch. Covers acceptable use, model selection, data handling, vendor contracts, compliance mapping, and board reporting.
hr-policy-generator
Comprehensive HR policy development covering attendance, time-off, overtime, remote work, and compliance. Generates structured policy documents, legal checklists, exception handling frameworks, and employee communication plans tailored to company size, work arrangement, and jurisdiction.
hr-policy-generator-cn
综合性 HR 政策设计工具,覆盖考勤、休假、加班、远程办公及合规要求。根据公司规模、办公模式、适用法律等输入,生成完整的政策文档、法律合规清单、例外处理机制及员工沟通方案。
Agent Security Auditor
Scans ERC-8004 agents for security vulnerabilities and generates comprehensive security reports.
Devvit Publishing Auditor
A specialized auditor for Reddit Devvit developers to verify app readiness before uploading to the Reddit servers. It ensures compliance with Devvit CLI v0.12.x and Reddit’s publishing standards.
openclaw-security-policy-check
OpenClaw 网关安全自动化审计与配置检查工具。自动检查 OpenClaw 配置文件中的常见安全风险,执行安全审计。适用于:
hefestoai-auditor
Static code analysis tool. Detects security vulnerabilities, code smells, and complexity issues across 17 languages. All analysis runs locally — no code leaves your machine.
clauditor
Tamper-resistant audit watchdog for Clawdbot agents. Detects and logs suspicious filesystem activity with HMAC-chained evidence.
aws-tagging-auditor
Audit AWS resource tagging compliance and identify unallocatable spend for FinOps teams
azure-storage-exposure-auditor
Identify publicly accessible Azure Storage accounts and misconfigured blob containers