1

    iac-security-scanner

    by Markus Isaksson

    Audit Terraform, CloudFormation, and Pulumi files for security risks, cost leaks, and compliance gaps.

    Updated May 2026
    Security scanned
    One-time purchase

    $12

    One-time purchase

    ⚡ Also available via Agensi MCP — your AI agent can load this skill on demand via MCP. Learn more →

    Included in download

    • Fix public S3 buckets and open SSH ports before they are deployed
    • Identify wildcard IAM permissions that violate the principle of least privilege
    • file_read automation included
    • Includes example output and usage patterns
    • Instant install

    See it in action

    # IaC Audit Report
    - Files in scope: 3
    - Total findings: 2 (Critical: 1, High: 1)
    - Finding #1: Critical (Public Exposure)
    - Location: main.tf:22 (aws_db_instance.main)
    - Issue: publicly_accessible = true
    - Patch:
     
    - publicly_accessible = true
    + publicly_accessible = false

    About This Skill

    Pre-Deployment Cloud Infrastructure Auditing

    The iac-security-scanner skill is a specialized tool for developers and DevOps engineers to audit Infrastructure-as-Code (IaC) files before deployment. It identifies critical misconfigurations, security vulnerabilities, and cost inefficiencies across AWS, GCP, and Azure providers.

    What it does

    The skill performs deep static analysis on your source files to detect risks in six key areas:

    • Network Exposure: Open ports (SSH/RDP) and overly broad ingress/egress rules.
    • Identity & Access: Hardcoded keys, wildcard IAM permissions, and overly permissive trust relationships.
    • Encryption: Missing at-rest or in-transit encryption for storage, databases, and load balancers.
    • Public Exposure: S3 buckets or RDS instances accidentally exposed to the public internet.
    • Cost Management: Over-provisioned instance types and missing lifecycle policies.
    • Governance: Missing mandatory tags for environment, owner, and cost center.

    Why use this skill

    Unlike simple linting or generic prompting, this skill understands the complex relationships between resources in frameworks like Terraform, CloudFormation, Pulumi, and AWS CDK. It doesn't just find problems; it provides severity-rated reports and concrete code patches (diffs) that you can apply immediately to secure your infrastructure.

    Supported Ecosystems

    Works with Terraform (.tf), CloudFormation (YAML/JSON), Pulumi (TypeScript/Python/Go), and AWS CDK. It targets AWS, GCP, and Azure resources to ensure multi-cloud posture management.

    📖 Learn more: Best DevOps & Deployment Skills for Claude Code →

    Use Cases

    • Fix public S3 buckets and open SSH ports before they are deployed
    • Identify wildcard IAM permissions that violate the principle of least privilege
    • Generate HCL/YAML patches to enable encryption for RDS and EBS volumes
    • Estimate monthly cost savings by identifying over-provisioned instance types

    Reviews

    No reviews yet - be the first to share your experience.

    Only users who have downloaded or purchased this skill can leave a review.

    Security Scanned

    Passed automated security review

    Permissions

    Read Files

    Reads IaC source files and produces an audit report with severity-rated findings and patched code. Does not access cloud accounts, does not query deployed resources, does not run plan/synth/preview. The user reviews patches and applies them through their normal IaC workflow.

    Frequently Asked Questions

    Similar Skills

    $12

    One-time