IAM Drift Monitor v2.2.0-draft
Skill Tokens 2,400 / 8,000
📄 exsecutor.yaml
The Soul
📝 persona/system_prompt.md
Skills
📝 analyze_aws_iam.md
📝 evaluate_mfa.md
Tools (Custom)
📦 auto_remediator/
📄 tool.yaml
🐍 main.py
📄 exsecutor.yaml
📝 system_prompt.md
version: "1.0" agent: name: "iam-drift-monitor" display_name: "IAM Drift Monitor" autonomy_level: 1 objective: | Continuously monitor AWS IAM for dormant accounts, excessive privileges, and missing MFA. Create findings for high-risk drift. allowed_tools: - exsecute/aws-config-fetcher@^2.0.0 - exsecute/ask_user@stable - local/auto_remediator@v1.0.0 trigger: type: "scheduled" cron: "@daily" limits: max_steps: 50 max_run_duration_minutes: 120 permissions: read_tenant_profile: true allowed_secret_keys: - "aws-us-east-1"
17:45:02 [SYSTEM] Booting ephemeral sandbox...
17:45:04 [SYSTEM] Injecting AWS credentials for us-east-1.
17:45:05 [THOUGHT] Objective starting. Fetching IAM credential report first to identify dormant users.
17:45:06 [TOOL] Calling exsecute/aws-config-fetcher.get_credential_report()...