aws-infraChat-based AWS infrastructure assistance using AWS CLI and console context. Use for querying, auditing, and monitoring AWS resources (EC2, S3, IAM, Lambda, ECS/EKS, RDS, CloudWatch, billing, etc.), and for proposing safe changes with explicit confirmation before any write/destructive action.
Install via ClawdBot CLI:
clawdbot install bmdhodl/aws-infraUse the local AWS CLI to answer questions about AWS resources. Default to read‑only queries. Only propose or run write/destructive actions after explicit user confirmation.
~/.aws/config.aws sts get-caller-identity--dry-run when available and show the plan before execution.list/describe/get commands.AWS_PROFILE / AWS_REGION if set, then fall back to ~/.aws/config.See references/aws-cli-queries.md for common command patterns.
assets/icon.svg — custom icon (dark cloud + terminal prompt)Generated Mar 1, 2026
IT teams use this skill to perform regular audits of AWS resources, such as listing EC2 instances, S3 buckets, and IAM roles to ensure compliance with security policies. It helps identify unused resources or misconfigurations without risking accidental changes, supporting governance and cost optimization efforts.
During system outages or performance issues, engineers leverage the skill to query CloudWatch logs and metrics for troubleshooting. It allows quick diagnosis of errors in Lambda functions or RDS databases while maintaining a read-only safety net to prevent further disruption during critical incidents.
Finance and DevOps teams utilize the skill to run read-only queries on AWS Cost Explorer and billing data. This enables tracking of spending trends, identifying cost drivers, and generating reports for budget planning without the risk of modifying billing settings or incurring unexpected charges.
Security analysts employ the skill to assess AWS infrastructure for vulnerabilities, such as checking S3 bucket public access policies or IAM credential usage. It facilitates routine security audits by providing actionable insights through safe queries, helping maintain regulatory compliance like GDPR or HIPAA.
Developers use the skill to monitor and propose changes to non-production AWS resources, such as scaling ECS clusters or updating Lambda functions. With its confirmation requirement for write actions, it ensures safe experimentation and deployment workflows in staging environments.
Offer this skill as part of a cloud management SaaS, charging monthly fees for access to enhanced auditing and monitoring features. Revenue is generated through tiered subscriptions based on usage levels or number of AWS accounts managed, targeting small to medium enterprises.
Integrate the skill into professional services for AWS infrastructure consulting, where experts use it to deliver audits, cost optimization, and security assessments. Revenue comes from project-based fees or retainer contracts, leveraging the skill's safety features to build client trust.
Provide a free version of the skill for basic read-only queries, then monetize through premium features like automated reporting, multi-account support, or advanced change management. Revenue is driven by upselling to paid plans for enterprise users seeking scalability and automation.
💬 Integration Tip
Integrate with existing CI/CD pipelines by using the skill's confirmation prompts to safely automate AWS resource checks during deployment stages, ensuring compliance without manual intervention.
Automatically update Clawdbot and all installed skills once daily. Runs via cron, checks for updates, applies them, and messages the user with a summary of what changed.
Full desktop computer use for headless Linux servers. Xvfb + XFCE virtual desktop with xdotool automation. 17 actions (click, type, scroll, screenshot, drag,...
Essential Docker commands and workflows for container management, image operations, and debugging.
Tool discovery and shell one-liner reference for sysadmin, DevOps, and security tasks. AUTO-CONSULT this skill when the user is: troubleshooting network issues, debugging processes, analyzing logs, working with SSL/TLS, managing DNS, testing HTTP endpoints, auditing security, working with containers, writing shell scripts, or asks 'what tool should I use for X'. Source: github.com/trimstray/the-book-of-secret-knowledge
Deploy applications and manage projects with complete CLI reference. Commands for deployments, projects, domains, environment variables, and live documentation access.
Monitor topics of interest and proactively alert when important developments occur. Use when user wants automated monitoring of specific subjects (e.g., product releases, price changes, news topics, technology updates). Supports scheduled web searches, AI-powered importance scoring, smart alerts vs weekly digests, and memory-aware contextual summaries.