📄 exsecutor.yaml
📝 system_prompt.md
version: "1.0"
agent:
name: "iam-drift-monitor"
display_name: "IAM Drift Monitor"
autonomy_level: 1
objective: |
Continuously monitor AWS IAM for dormant accounts, excessive privileges,
and missing MFA. Create findings for high-risk drift.
allowed_tools:
- exsecute/aws-config-fetcher@^2.0.0
- exsecute/ask_user@stable
- local/auto_remediator@v1.0.0
trigger:
type: "scheduled"
cron: "@daily"
limits:
max_steps: 50
max_run_duration_minutes: 120
permissions:
read_tenant_profile: true
allowed_secret_keys:
- "aws-us-east-1"
17:45:02
[SYSTEM]
Booting ephemeral sandbox...
17:45:04
[SYSTEM]
Injecting AWS credentials for us-east-1.
17:45:05
[THOUGHT]
Objective starting. Fetching IAM credential report first to identify dormant users.
17:45:06
[TOOL]
Calling exsecute/aws-config-fetcher.get_credential_report()...