agent-aws¶
Run CLI agents against AWS in a scoped read-only sandbox — even when the developer running the agent has both Administrator and ReadOnly roles assigned via IAM Identity Center.
Why¶
Modern coding agents need access to real infrastructure to be useful, but giving them the same blast radius as their human operator is a recipe for trouble. Prompt injection or a bad call from the agent shouldn't be able to cause damage your team can't easily undo.
agent-aws solves this with a layered design:
- The agent gets short-lived STS credentials for a non-admin role only.
- The credentials live in a per-run tempdir; the developer's
~/.aws/— including the SSO token cache that could be used to mint admin credentials — is invisible to the sandboxed process. - AWS-side IAM rejects any write actions even if the sandbox were bypassed.
Quick taste¶
brew install juanheyns/tap/agent-aws
agent-aws init --all # pick read-only profiles from ~/.aws/config
agent-aws login # standard SSO browser flow
agent-aws run -- claude # agent now has read-only AWS access
What's next¶
- Getting started → install, init, login, first run.
- Threat model → what attacks this stops, and what it doesn't.
- Configuration → multi-profile,
~/.agent-aws/config.jsonschema, all CLI flags. - Platform support → macOS
sandbox-execvs Linuxbwrap(bubblewrap), and the differences between them.