AWS | Amazon Web Services

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: aws Version: 1.0.2 The skill bundle provides extensive instructions and AWS CLI commands for an AI agent to manage AWS infrastructure, including architecture, cost optimization, and security hardening. While the stated purpose is legitimate AWS management, the skill instructs the agent to execute powerful commands that can create, modify, and delete critical AWS resources, IAM users (including admin users), and secrets (e.g., `aws iam create-user`, `aws rds create-db-instance`, `aws secretsmanager create-secret`, `aws configure`). These broad and powerful capabilities, even with the stated intent of requiring user confirmation for destructive operations, constitute significant high-risk behaviors. There is no evidence of intentional malicious prompt injection or data exfiltration, but the inherent power granted to the agent makes the skill suspicious.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If a mutating AWS command is copied or run without review, it could create charges, alter infrastructure, or change retention/deletion behavior.

Why it was flagged

The skill documents AWS CLI commands that can alter cloud resources and data lifecycle policies. This is aligned with cost optimization, but running it in the wrong account or bucket could eventually delete data.

Skill content
aws s3api put-bucket-lifecycle-configuration --bucket my-bucket ... "Expiration": {"Days": 365}
Recommendation

Before running AWS create/update/delete/lifecycle commands, verify AWS_PROFILE, region, account ID, target resource names, and prefer Terraform/CloudFormation plans or explicit user approval.

What this means

Running this in the wrong account or without MFA/least-privilege controls could create a powerful credential that increases account compromise risk.

Why it was flagged

The documentation includes a command to create a persistent IAM user with AdministratorAccess. It is visible and relevant to AWS setup, but it is a very broad privilege grant.

Skill content
aws iam create-user --user-name admin ... aws iam attach-user-policy --user-name admin --policy-arn arn:aws:iam::aws:policy/AdministratorAccess
Recommendation

Prefer IAM Identity Center, roles, MFA, and least-privilege policies; only create administrator users deliberately and after confirming the intended AWS account.

What this means

Incorrect or sensitive information in these memory files could influence future AWS advice or expose local details to anyone with filesystem access.

Why it was flagged

The skill discloses persistent local notes for AWS account context, inventory, and costs. This is purpose-aligned, but future recommendations may rely on whatever is stored there.

Skill content
Memory lives in `~/aws/` ... memory.md # Account context + preferences ... resources.md # Active infrastructure inventory ... costs.md # Cost tracking + alerts
Recommendation

Keep these files accurate, avoid storing secrets or access keys, and review or delete them when they are no longer needed.