Loading...
Loading...
Verified corrections for IAM behaviors that AI agents frequently get wrong — policy evaluation edge cases, trust policy gotchas, STS session limits, Organizations quirks, and SAML/MFA specifics. Use alongside documentation when working with IAM roles, policies, STS, or Organizations. Do NOT use for non-IAM authorization like Cognito user-pool policies or app-level RBAC.
npx skill4agent add aws/agent-toolkit-for-aws aws-iam?region=DuplicatePolicyAttachmentExceptionactivate()deactivate()delete()update()time.sleep(10)https://region-code.signin.aws.amazon.com/saml/acs/IdP-IDNullForAllValuesaws:TagKeys{
"Version": "2012-10-17",
"Statement": {
"Effect": "Allow",
"Action": "ec2:RunInstances",
"Resource": "*",
"Condition": {
"ForAllValues:StringEquals": {
"aws:TagKeys": ["Alpha", "Beta"]
},
"Null": {
"aws:TagKeys": "false"
}
}
}
}iam:PassRoleResource: "*"RunInstancesCreateFunctionUpdateFunctionConfigurationRegisterTaskDefinitionResourceiam:PassedToServiceiam:AssociatedResourceArnredshift-serverless.amazonaws.comredshift.amazonaws.comNot authorized to get credentials of rolecodebuild:*codecommit:*