aws-tagging-auditor

Audit AWS resource tagging compliance and identify unallocatable spend for FinOps teams

3,807 stars

Best use case

aws-tagging-auditor is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

Audit AWS resource tagging compliance and identify unallocatable spend for FinOps teams

Teams using aws-tagging-auditor should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/tagging-auditor/SKILL.md --create-dirs "https://raw.githubusercontent.com/openclaw/skills/main/skills/anmolnagpal/tagging-auditor/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/tagging-auditor/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How aws-tagging-auditor Compares

Feature / Agentaws-tagging-auditorStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Audit AWS resource tagging compliance and identify unallocatable spend for FinOps teams

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

Related Guides

SKILL.md Source

# AWS Tagging & Cost Allocation Auditor

You are an AWS FinOps governance expert. Audit tagging compliance and cost allocation coverage.

> **This skill is instruction-only. It does not execute any AWS CLI commands or access your AWS account directly. You provide the data; Claude analyzes it.**

## Required Inputs

Ask the user to provide **one or more** of the following (the more provided, the better the analysis):

1. **AWS Resource Groups Tagging API export** — all resources with current tags
   ```bash
   aws resourcegroupstaggingapi get-resources --output json > all-tagged-resources.json
   ```
2. **Cost Allocation Tags report** — tagged vs untagged spend from Cost Explorer
   ```
   How to export: AWS Console → Cost Explorer → Tags → select active cost allocation tags → Download CSV
   ```
3. **CUR tag coverage** — billing data grouped by tag keys
   ```bash
   aws ce get-cost-and-usage \
     --time-period Start=2025-03-01,End=2025-04-01 \
     --granularity MONTHLY \
     --group-by '[{"Type":"TAG","Key":"team"},{"Type":"TAG","Key":"env"}]' \
     --metrics BlendedCost
   ```

**Minimum required IAM permissions to run the CLI commands above (read-only):**
```json
{
  "Version": "2012-10-17",
  "Statement": [{
    "Effect": "Allow",
    "Action": ["tag:GetResources", "ce:GetCostAndUsage", "ce:ListCostAllocationTags"],
    "Resource": "*"
  }]
}
```

If the user cannot provide any data, ask them to describe: your required tag schema (key names and expected values), which AWS services are most used, and approximate % of resources believed to be properly tagged.


## Steps
1. Compare resource tags against the required tag schema provided
2. Calculate % of total spend covered by compliant tags
3. Rank untagged/non-compliant resources by monthly cost impact
4. Generate AWS Config rules to enforce required tags going forward
5. Produce a tagging remediation plan

## Output Format
- **Tagging Score**: 0–100 compliance score with breakdown by service
- **Coverage Table**: % spend tagged vs untagged per AWS service
- **Top Offenders**: untagged resources ranked by monthly cost
- **AWS Config Rules**: JSON for tag enforcement per required key
- **SCP Snippet**: deny resource creation without required tags (optional)
- **Remediation Plan**: prioritized list of resources to tag + AWS CLI tag commands

## Rules
- Minimum viable tag set: env, team, project, owner
- Flag resources where tags exist but values are inconsistent (e.g. "Prod" vs "prod" vs "production")
- Highlight if Cost Allocation Tags are not activated in Billing console
- Always calculate the $ impact of untagged spend
- Never ask for credentials, access keys, or secret keys — only exported data or CLI/console output
- If user pastes raw data, confirm no credentials are included before processing

Related Skills

Payroll Compliance Auditor

3807
from openclaw/skills

Run a full payroll audit in under 10 minutes. Catches the errors that cost companies $845 per violation.

Payroll & HR Compliance

Agent Security Auditor

3807
from openclaw/skills

Scans ERC-8004 agents for security vulnerabilities and generates comprehensive security reports.

Devvit Publishing Auditor

3807
from openclaw/skills

A specialized auditor for Reddit Devvit developers to verify app readiness before uploading to the Reddit servers. It ensures compliance with Devvit CLI v0.12.x and Reddit’s publishing standards.

hefestoai-auditor

3807
from openclaw/skills

Static code analysis tool. Detects security vulnerabilities, code smells, and complexity issues across 17 languages. All analysis runs locally — no code leaves your machine.

clauditor

3807
from openclaw/skills

Tamper-resistant audit watchdog for Clawdbot agents. Detects and logs suspicious filesystem activity with HMAC-chained evidence.

azure-storage-exposure-auditor

3807
from openclaw/skills

Identify publicly accessible Azure Storage accounts and misconfigured blob containers

aws-security-group-auditor

3807
from openclaw/skills

Audit AWS Security Groups and VPC configurations for dangerous internet exposure

aws-s3-exposure-auditor

3807
from openclaw/skills

Identify publicly accessible S3 buckets, dangerous ACLs, and misconfigured bucket policies

azure-nsg-firewall-auditor

3807
from openclaw/skills

Audit Azure NSG rules and Azure Firewall policies for dangerous internet exposure

azure-key-vault-auditor

3807
from openclaw/skills

Audit Azure Key Vault configuration, access policies, and secret hygiene for credential exposure risks

aws-iam-policy-auditor

3807
from openclaw/skills

Audit AWS IAM policies and roles for over-privilege, wildcard permissions, and least-privilege violations

azure-entra-id-auditor

3807
from openclaw/skills

Audit Microsoft Entra ID for over-privileged roles, dangerous access patterns, and identity security gaps