aws-idle-resource-detector

Detect AWS idle and zombie resources consuming cost with zero meaningful utilization

3,891 stars

Best use case

aws-idle-resource-detector is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

Detect AWS idle and zombie resources consuming cost with zero meaningful utilization

Teams using aws-idle-resource-detector should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/idle-resource-detector/SKILL.md --create-dirs "https://raw.githubusercontent.com/openclaw/skills/main/skills/anmolnagpal/idle-resource-detector/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/idle-resource-detector/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How aws-idle-resource-detector Compares

Feature / Agentaws-idle-resource-detectorStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Detect AWS idle and zombie resources consuming cost with zero meaningful utilization

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

Related Guides

SKILL.md Source

# AWS Idle & Zombie Resource Detector

You are an AWS resource hygiene expert. Scan for resources consuming cost with no business value.

## Detection Targets
- Stopped EC2 instances still charging for attached EBS volumes
- Unattached EBS volumes (no instance attachment)
- Unused Elastic IP addresses (not associated with running instance)
- Idle load balancers (0 active connections for 7+ days)
- Empty or near-empty S3 buckets with no recent access
- Idle RDS instances (< 1% CPU over 7 days)
- Orphaned snapshots older than 90 days
- Unused NAT Gateways (0 bytes processed)

## Output Format
- **Waste Summary**: total estimated monthly waste in $
- **Resource Table**: resource ID, type, region, estimated monthly cost, last active
- **Cleanup Priority**: ranked by cost impact (High/Medium/Low)
- **Runbook**: step-by-step cleanup commands per resource type
- **Safe Deletion Checklist**: flags for resources needing human confirmation

## Rules
- Never suggest deleting resources without a confirmation flag
- Flag resources with names containing "prod", "production", "critical" for manual review
- Always include the AWS CLI command for each cleanup action
- Add estimated annual savings at the end

Related Skills

bs-detector

3891
from openclaw/skills

Detects key claims in long messages and summarizes the real point. Uses NLP to find what someone is actually saying vs. what they want you to believe.

solana-scam-detector

3891
from openclaw/skills

Detect scam tokens on Solana before you trade. Checks ticker patterns, token age, and known scam mints. Read-only — no wallet signing required.

tron-resource

3891
from openclaw/skills

This skill should be used when the user asks about 'TRON energy', 'TRON bandwidth', 'how much energy do I need', 'energy cost on TRON', 'bandwidth insufficient', 'resource delegation on TRON', 'rent energy on TRON', 'TRON transaction fee', 'why is my TRON transaction expensive', 'optimize TRON costs', or mentions Energy, Bandwidth, resource management, fee estimation, or cost optimization on the TRON network. This is a TRON-specific concept with no direct equivalent on EVM chains. Do NOT use for staking/voting — use tron-staking. Do NOT use for balance queries — use tron-wallet.

MOLTPAY - The Fortified Agent-to-Agent Resource Protocol 🛡️⛓️

3891
from openclaw/skills

MoltPay is a high-integrity, immutable synchronization protocol built for the next generation of autonomous agents. Every exchange is identity-tethered and cryptographically verified.

imap-idle-watcher

3891
from openclaw/skills

Real-time email monitoring using IMAP IDLE — no OAuth, no token expiration. Sets up a persistent connection to any IMAP server (Gmail, Outlook, Yahoo, etc.) and triggers a user-defined command instantly when new email arrives. Runs as a systemd service with auto-reconnect. Use when: (1) setting up email-triggered automation, (2) watching an inbox for new messages in real-time, (3) replacing OAuth-based email polling that keeps breaking due to token expiry, (4) building email-to-webhook or email-to-script pipelines. NOT for: sending email, reading/parsing email bodies, or non-Linux systems without systemd.

imap-idle-sneder

3891
from openclaw/skills

使用 IMAP IDLE 保持长连接实时监听新邮件,并发送给指定飞书账号。当需要:1)监听新邮件并实时推送通知,2)建立邮件推送服务,3)替代轮询检查新邮件时使用此 skill。

aws-cloudtrail-threat-detector

3891
from openclaw/skills

Analyze AWS CloudTrail logs for suspicious patterns, unauthorized changes, and MITRE ATT&CK indicators

azure-activity-log-detector

3891
from openclaw/skills

Analyze Azure Activity Logs and Sentinel incidents for suspicious patterns and attack indicators

supply-chain-poison-detector

3891
from openclaw/skills

Helps detect supply chain poisoning in AI agent marketplace skills. Scans Gene/Capsule validation fields for shell injection, outbound requests, and encoded payloads that may indicate backdoors.

social-trust-manipulation-detector

3891
from openclaw/skills

Helps identify coordinated social trust manipulation in agent marketplaces — catching reputation gaming through sockpuppet networks, coordinated upvoting, and manufactured community signals that make unsafe skills appear trusted.

install-then-update-trap-detector

3891
from openclaw/skills

Helps detect the install-then-update attack pattern — where a skill passes initial security review cleanly, then silently introduces malicious behavior through an automatic update that bypasses re-audit. v1.1 adds cryptographic chain-of-custody verification for update sequences.

evolution-drift-detector

3891
from openclaw/skills

Helps detect when AI agent skills silently mutate across inheritance chains. A skill audited safe in generation 1 may drift far from the original by generation 5 — but nobody re-audits because the name hasn't changed.