2

    finops-anomaly-intelligence

    by appugouda ai

    Turn AWS billing mysteries into 10-minute root cause reports by correlating cost spikes with engineering events.

    Updated Apr 2026
    0 installs

    Free

    One-time purchase · Own forever

    ⚡ Also available via Agensi MCP — your AI agent can load this skill on demand via MCP. Learn more →

    Included in download

    • Downloadable skill package
    • Works with Claude Code
    • 3 permissions declared
    • Instant install

    See it in action

    HYPOTHESIS #1 [Confidence: HIGH | 87%]
    Root Cause: PR #4821 (@platform-team) removed S3 VPC Endpoint.
    Evidence: NatGatewayBytesOut +340% at 14:22 UTC matches PR merge time.
    Cost Delta: +$2,403 over 5 days.
    Monthly Projection: $18,240.
    Remediation: Re-add aws_vpc_endpoint.s3 to Terraform config.

    About This Skill

    What it does

    FinOps Anomaly Intelligence is a root-cause analysis engine designed to investigate and resolve AWS cost spikes. It moves beyond simple alerts by cross-correlating AWS billing data (CUR/Cost Explorer) with engineering activities across GitHub, Jira, CloudWatch, and PagerDuty. At a high level, it detects the anomaly window, identifies impacted services, ranks root-cause hypotheses with confidence scores, and quantifies the "cost of inaction."

    Why use this skill

    Standard AWS alerts tell you that you spent too much, but they don't tell you why. Manually tracing a $10k spike through CloudTrail logs and PR history can take hours. This skill reduces that to 10 minutes. It is better than simple prompting because it uses a structured sequence of data extraction and correlation scripts to provide proof-based answers, not just hallucinations. It ensures developers see the financial impact of their code changes in real-time.

    Supported tools

    • Cloud: AWS (Cost Explorer, CUR, CloudWatch)
    • VCS/Task Management: GitHub Enterprise, Jira REST API
    • Observability/Ops: PagerDuty, Slack API
    • Frameworks: Boto3, Pandas, Python 3.10+

    What the output looks like

    The skill produces structured JSON data for workflows and human-readable Markdown reports. This includes a ranked Hypothesis Report linking specific PRs to dollar amounts, a Cost of Inaction table for executive reporting, and a pre-formatted Jira ticket ready for assignment to the responsible engineering team.

    📖 Learn more: Best DevOps & Deployment Skills for Claude Code →

    Use Cases

    • Identify the specific GitHub PR or Jira ticket that caused an AWS cost spike
    • Quantify the annual financial impact of unoptimized cloud infrastructure
    • Generate a weekly 'Cost Story' digest for engineering leadership
    • Automatically draft Jira remediation tickets assigned to responsible dev teams
    • Correlate CloudWatch scaling events with unexpected billing anomalies

    Reviews

    No reviews yet — be the first to share your experience.

    Only users who have downloaded or purchased this skill can leave a review.

    Security Scanned

    Passed automated security review

    Permissions

    Terminal / Shell
    Network Access
    Environment Variables

    Allowed Hosts

    yourco.atlassian.net
    hooks.slack.com
    api.github.com
    api.pagerduty.com

    File Scopes

    finops-anomaly-intelligence/**

    ### AWS IAM Permissions Attach the FinOps read-only policy defined in `references/integration-patterns.md` to your AWS IAM user or role. Minimum required: `ce:GetCostAndUsage`, `cloudwatch:DescribeAlarmHistory`. ## Security Notes - Never log or emit AWS account IDs, IAM ARNs, or API keys in output files. - CUR S3 bucket access requires IAM role with `cur:DescribeReportDefinitions` and `s3:GetObject` on the CUR bucket — least-privilege only. - Jira/GitHub tokens: read via env vars (`JIRA_TOKEN`, `GITHUB_TOKEN`) — never hardcode. - Slack webhook URLs: store in AWS Secrets Manager or `.env` (gitignored).

    Claude Code

    Frequently Asked Questions

    Similar Skills

    Free