Aws Cloudformation S3

🌐Community
by giuseppe-trisciuoglio · vlatest · Repository

Provides AWS guidance and assistance for deploying and managing cloud infrastructure.

Install on your platform

We auto-selected Claude Code based on this skill’s supported platforms.

1

Run in terminal (recommended)

terminal
claude mcp add aws-cloudformation-s3 npx -- -y @trustedskills/aws-cloudformation-s3
2

Or manually add to ~/.claude/settings.json

~/.claude/settings.json
{
  "mcpServers": {
    "aws-cloudformation-s3": {
      "command": "npx",
      "args": [
        "-y",
        "@trustedskills/aws-cloudformation-s3"
      ]
    }
  }
}

Requires Claude Code (claude CLI). Run claude --version to verify your install.

About This Skill

The aws-cloudformation-s3 skill enables AI agents to programmatically manage Amazon S3 buckets and objects using AWS CloudFormation templates. It automates the provisioning, configuration, and lifecycle management of storage resources within a defined infrastructure-as-code framework.

When to use it

  • Automatically provision secure S3 buckets with specific access policies during infrastructure deployment.
  • Enforce consistent bucket configurations (encryption, versioning) across multiple environments via templates.
  • Manage object-level permissions and lifecycle rules without manual console intervention.
  • Roll back storage configurations instantly by updating or reverting CloudFormation stacks.

Key capabilities

  • Create and delete S3 buckets through CloudFormation stack operations.
  • Define bucket policies, CORS configurations, and ACLs in template syntax.
  • Configure server-side encryption (SSE-S3, SSE-KMS) and versioning settings.
  • Set up lifecycle rules for automatic object transition or expiration.

Example prompts

  • "Create an S3 bucket named 'app-logs' with versioning enabled and a lifecycle rule to expire objects after 90 days."
  • "Update the CloudFormation stack to add a bucket policy allowing read access only from specific IP ranges."
  • "Delete the S3 bucket associated with the 'dev-storage' CloudFormation stack if it is empty."

Tips & gotchas

Ensure your AWS credentials have cloudformation:CreateStack and s3:* permissions before execution. Complex policies may require manual validation in the CloudFormation console to avoid template syntax errors.

Tags

🛡️

TrustedSkills Verification

Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.

Security Audits

Gen Agent Trust HubPass
SocketPass
SnykPass

Details

Version
vlatest
License
Author
giuseppe-trisciuoglio
Installs
71

🌐 Community

Passed automated security scans.