/ 디렉터리 / 플레이그라운드 / aws-skills
● 커뮤니티 zxkane ⚡ 바로 사용

aws-skills

제작: zxkane · zxkane/aws-skills

Claude agent skills for AWS — shell-first workflows covering common services, with sensible defaults and least-privilege IAM.

aws-skills wraps common AWS CLI workflows as agent skills: EC2 fleet ops, S3 policy checks, IAM audits, CloudFormation/CDK scaffolding, and cost queries. Shell-first so you always see the commands being run. Pairs well with TerraShark for IaC.

왜 쓰나요

핵심 기능

라이브 데모

실제 사용 모습

aws-skill.replay ▶ 준비됨
0/0

설치

클라이언트 선택

~/Library/Application Support/Claude/claude_desktop_config.json  · Windows: %APPDATA%\Claude\claude_desktop_config.json
{
  "mcpServers": {
    "aws-skill": {
      "command": "git",
      "args": [
        "clone",
        "https://github.com/zxkane/aws-skills",
        "~/.claude/skills/aws-skills"
      ],
      "_inferred": true
    }
  }
}

Claude Desktop → Settings → Developer → Edit Config 열기. 저장 후 앱 재시작.

~/.cursor/mcp.json · .cursor/mcp.json
{
  "mcpServers": {
    "aws-skill": {
      "command": "git",
      "args": [
        "clone",
        "https://github.com/zxkane/aws-skills",
        "~/.claude/skills/aws-skills"
      ],
      "_inferred": true
    }
  }
}

Cursor는 Claude Desktop과 동일한 mcpServers 스키마 사용. 프로젝트 설정이 전역보다 우선.

VS Code → Cline → MCP Servers → Edit
{
  "mcpServers": {
    "aws-skill": {
      "command": "git",
      "args": [
        "clone",
        "https://github.com/zxkane/aws-skills",
        "~/.claude/skills/aws-skills"
      ],
      "_inferred": true
    }
  }
}

Cline 사이드바의 MCP Servers 아이콘 클릭 후 "Edit Configuration" 선택.

~/.codeium/windsurf/mcp_config.json
{
  "mcpServers": {
    "aws-skill": {
      "command": "git",
      "args": [
        "clone",
        "https://github.com/zxkane/aws-skills",
        "~/.claude/skills/aws-skills"
      ],
      "_inferred": true
    }
  }
}

Claude Desktop과 같은 형식. Windsurf 재시작 후 적용.

~/.continue/config.json
{
  "mcpServers": [
    {
      "name": "aws-skill",
      "command": "git",
      "args": [
        "clone",
        "https://github.com/zxkane/aws-skills",
        "~/.claude/skills/aws-skills"
      ]
    }
  ]
}

Continue는 맵이 아닌 서버 오브젝트 배열 사용.

~/.config/zed/settings.json
{
  "context_servers": {
    "aws-skill": {
      "command": {
        "path": "git",
        "args": [
          "clone",
          "https://github.com/zxkane/aws-skills",
          "~/.claude/skills/aws-skills"
        ]
      }
    }
  }
}

context_servers에 추가. 저장 시 Zed가 핫 리로드.

claude mcp add aws-skill -- git clone https://github.com/zxkane/aws-skills ~/.claude/skills/aws-skills

한 줄 명령. claude mcp list로 확인, claude mcp remove로 제거.

사용 사례

실전 활용법: aws-skills

How to run a fleet-wide operation on EC2 safely

👤 Cloud ops engineers running one-off fleet operations ⏱ ~20 min intermediate

언제 쓸까: You need to patch or restart a group of instances matching a tag, without writing the whole script yourself.

사전 조건
  • Skill installed — git clone https://github.com/zxkane/aws-skills ~/.claude/skills/aws-skills
  • aws CLI configured — aws configure or SSO profile
흐름
  1. Dry-run the query
    Use aws-skill. List EC2 instances tagged Env=staging, App=api. Just describe, don't mutate.✓ 복사됨
    → Table of instance IDs with state
  2. Plan the action
    Now propose the command to restart all running ones. Show me the exact aws cli call before running it.✓ 복사됨
    → Command printed; no execution yet
  3. Execute with guardrails
    Execute in batches of 3 with 30s between batches. Abort if any fails.✓ 복사됨
    → Batched output with success/failure per batch

결과: A controlled fleet operation with no unpleasant surprises.

함정
  • Wrong profile/region destroys prod — Always echo the resolved profile + region as the first line of any action

Audit S3 bucket policies for public exposure

👤 Security engineers looking for public S3 risk ⏱ ~30 min intermediate

언제 쓸까: Before a compliance review, or after a misconfig alert.

흐름
  1. List buckets
    List all S3 buckets in our account with their public access block settings and any bucket policies that allow *.✓ 복사됨
    → Table with per-bucket status
  2. Triage
    Flag buckets that have public access and don't match our known public-bucket allowlist (list: [...]). Propose remediation for each.✓ 복사됨
    → Remediation plan per flagged bucket

결과: A prioritized remediation list for S3 public exposure.

함정
  • OAI / OAC for CloudFront looks public at the bucket level — Check CloudFront origin config before flagging

Scope an IAM policy to least privilege

👤 Engineers with an overly-broad policy to tighten ⏱ ~45 min advanced

언제 쓸까: A service account works with AdministratorAccess and you want to scope it down.

흐름
  1. Collect usage
    Pull the Access Analyzer / CloudTrail-derived actions used by this role over last 30 days.✓ 복사됨
    → Actions table
  2. Generate scoped policy
    Write the minimal policy matching those actions. No wildcard Resource unless necessary; comment where wildcards are justified.✓ 복사됨
    → Policy JSON with comments

결과: A least-privilege policy with documented rationale.

함정
  • 30 days isn't long enough to capture all paths — Verify against known monthly or quarterly jobs before flipping the policy

Answer a cost question quickly

👤 Engineers and finance owners chasing spend ⏱ ~20 min intermediate

언제 쓸까: Finance asks 'why did S3 spend spike in April?' — you want an answer before the meeting.

흐름
  1. Query
    Use Cost Explorer to compare S3 spend April vs March by usage type.✓ 복사됨
    → Diff table by usage type
  2. Explain
    Which usage type grew most, and which bucket is most likely responsible?✓ 복사됨
    → Hypothesis with specific bucket candidates

결과: A specific attribution you can follow up on.

조합

다른 MCP와 조합해 10배 효율

aws-skill + terrashark-skill

AWS-skill for one-off ops, TerraShark for codified infra

Investigate with aws-skill, then codify the fix as Terraform with terrashark.✓ 복사됨

Security reviews on IAM and S3 configs

After IAM scoping, run OWASP review on the resulting policy.✓ 복사됨

도구

이 MCP가 노출하는 것

도구입력언제 호출비용
EC2 fleet ops - Tag-scoped fleet ops 1+ AWS API calls
S3 policy audit - Security review 1+ API calls
IAM scoping role_name Tightening access Access Analyzer + CloudTrail calls
Cost queries service, range Spend investigations Cost Explorer calls
CFN/CDK scaffolding - New stacks Claude tokens

비용 및 제한

운영 비용

API 쿼터
AWS API limits vary per service; usually non-issue for interactive use
호출당 토큰
5-15k for planning; execution is free of Claude tokens
금액
Free skill; AWS usage billed as normal
Cost Explorer API has per-request pricing. Cache results when iterating.

보안

권한, 시크릿, 파급범위

자격 증명 저장: Standard AWS CLI credentials (shared config, SSO). Skill reads active profile.
데이터 외부 송신: All AWS API calls. Command outputs may contain sensitive data (ARNs, tags).
절대 부여 금지: AdministratorAccess for interactive use

문제 해결

자주 발생하는 오류와 해결

AccessDenied despite correct profile

Role session may have expired. Re-authenticate (aws sso login or STS refresh)

확인: aws sts get-caller-identity
Commands hit the wrong region

Skill respects AWS_REGION env; set explicitly or pass --region each call

Rate-limiting on large fleet ops

Use the skill's batch mode with delays

대안

aws-skills 다른 것과 비교

대안언제 쓰나단점/장점
AWS MCP serverYou want native MCP tool calls instead of shell-firstLess shell visibility; different trust model

더 보기

리소스

📖 GitHub에서 공식 README 읽기

🐙 열린 이슈 보기

🔍 400+ MCP 서버 및 Skills 전체 보기