Watadot Aws Iam

PassAudited by VirusTotal on May 11, 2026.

Overview

Type: OpenClaw Skill Name: watadot-aws-iam Version: 1.0.0 The skill bundle contains standard AWS CLI commands for IAM auditing and management, such as listing users, checking access key ages, and assuming roles. The instructions in SKILL.md align with security best practices and do not exhibit any signs of malicious intent, data exfiltration, or prompt injection.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If run with a privileged AWS profile, the agent may view broad IAM inventory information for the account.

Why it was flagged

The skill documents AWS CLI commands that can enumerate IAM users and access-key metadata across an AWS account. This is aligned with IAM auditing, but users should understand the account-wide scope before running it.

Skill content
aws iam list-users --query "Users[].{User:UserName,Arn:Arn,Date:CreateDate}" --output table
Recommendation

Run these commands only against the intended AWS account/profile and prefer least-privilege read-only IAM permissions for audit tasks.

What this means

Using this command with a powerful role could give the agent temporary access to sensitive AWS resources.

Why it was flagged

The skill includes a role-assumption command that can obtain temporary AWS credentials for whatever role ARN is provided. This is expected for IAM role workflows, but it is high-impact account delegation.

Skill content
aws sts assume-role --role-arn <role-arn> --role-session-name "OpenClawSession"
Recommendation

Only assume roles you intend to use, verify the active AWS account and role permissions, and avoid pasting or exposing temporary credentials in chat or logs.