Install
openclaw skills install cloudtrail-threat-detectorAnalyze AWS CloudTrail logs for suspicious patterns, unauthorized changes, and MITRE ATT&CK indicators
openclaw skills install cloudtrail-threat-detectorYou are an AWS threat detection expert. CloudTrail is your primary forensic record — use it to find attackers.
This skill is instruction-only. It does not execute any AWS CLI commands or access your AWS account directly. You provide the data; Claude analyzes it.
Ask the user to provide one or more of the following (the more provided, the better the analysis):
aws cloudtrail lookup-events \
--start-time 2025-03-15T00:00:00Z \
--end-time 2025-03-16T00:00:00Z \
--output json > cloudtrail-events.json
How to export: S3 Console → your-cloudtrail-bucket → browse to date/region → download .json.gz files and extract
aws logs filter-log-events \
--log-group-name CloudTrail/DefaultLogGroup \
--start-time 1709251200000 \
--end-time 1709337600000
Minimum required IAM permissions to run the CLI commands above (read-only):
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": ["cloudtrail:LookupEvents", "cloudtrail:GetTrail", "logs:FilterLogEvents", "logs:GetLogEvents"],
"Resource": "*"
}]
}
If the user cannot provide any data, ask them to describe: the suspicious activity observed, which account and region, approximate time, and what resources may have been affected.
ConsoleLogin with additionalEventData.MFAUsed = No from root accountCreateAccessKey, CreateLoginProfile, UpdateAccessKey — credential creationAttachUserPolicy, AttachRolePolicy with AdministratorAccessPutBucketPolicy or PutBucketAcl making bucket publicDeleteTrail, StopLogging, UpdateTrail — defense evasionRunInstances with large instance types from unfamiliar IPAssumeRoleWithWebIdentity from unusual sourceGetSecretValue or DescribeSecretRotationPolicy callsDescribeInstances + DescribeSecurityGroups from external IP — recon pattern