Aws Penetration Testing
Helps with AWS, testing as part of deploying and managing cloud infrastructure workflows.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add davila7-aws-penetration-testing npx -- -y @trustedskills/davila7-aws-penetration-testing
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"davila7-aws-penetration-testing": {
"command": "npx",
"args": [
"-y",
"@trustedskills/davila7-aws-penetration-testing"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
The AWS Penetration Testing skill empowers AI agents to simulate security attacks on Amazon Web Services infrastructure. It automates the discovery of vulnerabilities, misconfigurations, and potential entry points within cloud environments to assess security posture.
When to use it
- Conducting pre-deployment security audits for new AWS architectures before going live.
- Validating the effectiveness of existing firewall rules and IAM policies against simulated threats.
- Performing red team exercises to identify gaps in network segmentation and data protection strategies.
- Assessing compliance readiness for regulations like GDPR or HIPAA by testing access controls.
Key capabilities
- Automated scanning of AWS resources for common misconfigurations.
- Identification of exposed S3 buckets, open security groups, and unencrypted storage.
- Simulation of credential theft and privilege escalation scenarios within the cloud account.
- Generation of detailed reports highlighting critical risks and remediation steps.
Example prompts
- "Run a penetration test on my AWS account to find any publicly accessible S3 buckets or open security groups."
- "Simulate an attack vector targeting our EC2 instances to check if SSH access is properly restricted."
- "Analyze our IAM roles for excessive permissions that could lead to privilege escalation."
Tips & gotchas
Ensure you have explicit authorization from AWS account owners before running penetration tests, as unauthorized scanning can trigger security alerts or violate terms of service. Always configure the skill to operate in a non-destructive mode to prevent accidental data loss during testing phases.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.