Assume Cloudformation Role
This skill allows you to automatically assume a CloudFormation role for your Lambda function, simplifying permissions management and enhancing security.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add assume-cloudformation-role npx -- -y @trustedskills/assume-cloudformation-role
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"assume-cloudformation-role": {
"command": "npx",
"args": [
"-y",
"@trustedskills/assume-cloudformation-role"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
This skill allows an AI agent to assume a CloudFormation role. This enables the agent to interact with and manage AWS resources defined in CloudFormation templates, granting temporary permissions for specific tasks. It facilitates automated infrastructure provisioning and management within your AWS environment.
When to use it
- Automating deployments: Use this when you need to deploy or update CloudFormation stacks as part of a larger automation workflow.
- Resource cleanup: Employ the skill to automatically delete unused resources defined in a CloudFormation template after testing or experimentation.
- Infrastructure provisioning: Leverage the agent to create new infrastructure based on pre-defined CloudFormation templates, streamlining setup processes.
- Security audits: Use it to review and validate configurations within your CloudFormation stacks for compliance purposes.
Key capabilities
- Assumes a specified IAM role.
- Interacts with AWS resources through CloudFormation.
- Supports automated infrastructure management tasks.
Example prompts
- "Assume the CloudFormation role 'DeploymentAdmin' and update stack 'MyWebApp'."
- "Using the CloudFormation role, delete all stacks in region us-east-1 that have 'test' in their name."
- "Can you assume the CloudFormation role named 'InfrastructureProvisioner'?"
Tips & gotchas
- Ensure the AI agent has appropriate permissions to assume the specified IAM role.
- Be mindful of the potential impact when modifying or deleting resources via CloudFormation; always test changes in a non-production environment first.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.