Watadot Aws S3

High-performance S3 management by Watadot Studio. Includes bucket orchestration, sync, and lifecycle management.

MIT-0 · Free to use, modify, and redistribute. No attribution required.
0 · 15 · 0 current installs · 0 all-time installs
MIT-0
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description claim S3 management and the SKILL.md contains aws CLI commands (bucket management, sync, lifecycle). Requiring the aws binary is appropriate and proportional to the declared purpose.
Instruction Scope
The instructions are narrowly scoped to S3 operations and best practices. They include potentially destructive operations (e.g., 'aws s3 mb', 'aws s3 sync --delete') — this is coherent with an S3 management tool but users should be aware these commands can create, overwrite, or delete objects if run with active credentials.
Install Mechanism
No install spec and no code files — instruction-only. This is low-risk and consistent with a CLI-guidance skill.
Credentials
The skill does not declare or request AWS credentials explicitly (no required env vars), but it implicitly depends on AWS credentials/config available to the aws CLI (environment variables, IAM role, or ~/.aws config). That is expected, but users should ensure the agent's credentials are scoped with least privilege.
Persistence & Privilege
always is false and the skill is user-invocable with normal autonomous invocation allowed. There is no request to modify other skills or system-wide settings.
Assessment
This skill is coherent for S3 management, but before installing: ensure the host running the agent has the aws CLI and that any AWS credentials available to the agent are intentionally provided and scoped with least privilege (restrict to specific buckets/prefixes). Be cautious running commands like 'sync --delete' or bucket creation on production accounts — test on non-production data first. If you want the agent to run without exposing full account-level credentials, prefer an IAM role or a credentials set limited to the target buckets. Lastly, remember this is instruction-only: the agent will execute aws CLI commands using whatever AWS identity is present in its environment.

Like a lobster shell, security has layers — review code before you run it.

Current versionv1.0.0
Download zip
latestvk97b6203t9tjyqgn74cny9009s830cm7

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🪣 Clawdis
Any binaws

SKILL.md

AWS S3 Skills

Advanced patterns for Amazon Simple Storage Service (S3) utilization.

🚀 Core Commands

Bucket Management

# List all buckets with creation date
aws s3api list-buckets --query "Buckets[].{Name:Name,Created:CreationDate}" --output table

# Create a bucket with specific region
aws s3 mb s3://<bucket-name> --region <region>

High-Speed Synchronization

# Intelligent sync (only changed files)
aws s3 sync ./local-dir s3://<bucket-name>/path --delete --exclude "*.tmp"

# Concurrent upload tuning (performance)
aws configure set default.s3.max_concurrent_requests 20

Content Discovery & Filtering

# Find objects larger than 100MB
aws s3api list-objects-v2 --bucket <bucket-name> --query "Contents[?Size > \`104857600\`].[Key, Size]" --output json

# Total size of a prefix
aws s3 ls s3://<bucket-name>/prefix --recursive --human-readable --summarize | tail -n 2

🧠 Best Practices

  1. Least Privilege: Always use IAM policies that restrict access to specific buckets/prefixes.
  2. Versioning: Enable versioning for critical production data to prevent accidental deletions.
  3. Encrypted at Rest: Enforce SSE-S3 or SSE-KMS for all sensitive objects.
  4. Lifecycle Policies: Automate transition to S3 Glacier for aging assets to optimize cost.

Files

1 total
Select a file
Select a file to preview.

Comments

Loading comments…