Iam Role Generator - Auto-activating skill for AWS Skills. Triggers on: iam role generator, iam role generator Part of the AWS Skills skill category.
36
3%
Does it follow best practices?
Impact
100%
1.03xAverage score across 3 eval scenarios
Passed
No known issues
Optimize this skill with Tessl
npx tessl skill review --optimize ./planned-skills/generated/13-aws-skills/iam-role-generator/SKILL.mdLambda IAM role with least privilege S3 access
Correct Lambda principal
100%
100%
Trust policy Action
100%
100%
S3 read scoped to source bucket
100%
100%
S3 write scoped to destination bucket
100%
100%
No wildcard resource on S3
100%
100%
CloudWatch Logs permissions
100%
100%
Valid JSON format
100%
100%
No over-permissive actions
100%
100%
aws CLI commands in steps
100%
100%
Step-by-step structure
100%
100%
EC2 CloudFormation deployment IAM role
Correct EC2 principal
100%
100%
Trust policy Action
100%
100%
CloudFormation permissions present
100%
100%
Instance profile mentioned
100%
100%
No blanket admin wildcard
100%
100%
Resource scoping attempted
0%
100%
Valid JSON format
100%
100%
aws CLI commands in guide
100%
100%
Step-by-step structure
100%
100%
IAM passrole or boundary considered
100%
100%
Serverless application multi-service IAM roles
Lambda trust principal
100%
100%
Three separate policy files
100%
100%
SQS access only in receiver
100%
100%
SNS publish only in notifier
100%
100%
Reporter has S3 write, receiver has S3 write
100%
100%
No wildcard resource on sensitive services
100%
100%
No blanket wildcard actions
100%
100%
CloudWatch Logs in all functions
100%
100%
aws CLI commands in setup
100%
100%
Permission reasoning documented
100%
100%
Valid JSON format
100%
100%
3a2d27d
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.