Assume Cloudformation Role

🌐Community
by daisuke897 · vlatest · Repository

This skill allows you to automatically assume a CloudFormation role for your Lambda function, simplifying permissions management and enhancing security.

Install on your platform

We auto-selected Claude Code based on this skill’s supported platforms.

1

Run in terminal (recommended)

terminal
claude mcp add assume-cloudformation-role npx -- -y @trustedskills/assume-cloudformation-role
2

Or manually add to ~/.claude/settings.json

~/.claude/settings.json
{
  "mcpServers": {
    "assume-cloudformation-role": {
      "command": "npx",
      "args": [
        "-y",
        "@trustedskills/assume-cloudformation-role"
      ]
    }
  }
}

Requires Claude Code (claude CLI). Run claude --version to verify your install.

About This Skill

What it does

This skill allows an AI agent to assume a CloudFormation role. This enables the agent to interact with and manage AWS resources defined in CloudFormation templates, granting temporary permissions for specific tasks. It facilitates automated infrastructure provisioning and management within your AWS environment.

When to use it

  • Automating deployments: Use this when you need to deploy or update CloudFormation stacks as part of a larger automation workflow.
  • Resource cleanup: Employ the skill to automatically delete unused resources defined in a CloudFormation template after testing or experimentation.
  • Infrastructure provisioning: Leverage the agent to create new infrastructure based on pre-defined CloudFormation templates, streamlining setup processes.
  • Security audits: Use it to review and validate configurations within your CloudFormation stacks for compliance purposes.

Key capabilities

  • Assumes a specified IAM role.
  • Interacts with AWS resources through CloudFormation.
  • Supports automated infrastructure management tasks.

Example prompts

  • "Assume the CloudFormation role 'DeploymentAdmin' and update stack 'MyWebApp'."
  • "Using the CloudFormation role, delete all stacks in region us-east-1 that have 'test' in their name."
  • "Can you assume the CloudFormation role named 'InfrastructureProvisioner'?"

Tips & gotchas

  • Ensure the AI agent has appropriate permissions to assume the specified IAM role.
  • Be mindful of the potential impact when modifying or deleting resources via CloudFormation; always test changes in a non-production environment first.

Tags

🛡️

TrustedSkills Verification

Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.

Security Audits

Gen Agent Trust HubPass
SocketPass
SnykPass

Details

Version
vlatest
License
Author
daisuke897
Installs
3

🌐 Community

Passed automated security scans.