-
Notifications
You must be signed in to change notification settings - Fork 60
RFC: aws-dev-toolkit — Comprehensive AWS development toolkit plugin (v0.12.0, 34 skills) #108
Description
Updated 2026-04-06: Updated to reflect v0.12.0 — 34 skills (was 30), 33 reference files, renamed bedrock-cost → bedrock, added rds-aurora, agentcore, iot, mlops skills, concrete justifications on all opinionated recommendations. See detailed comparison comment for the full argument.
Is this related to an existing feature request or issue?
Yes, PR #107 already exists with an initial submission of this plugin. This RFC formalizes the proposal per the contributing guidelines so that maintainers can evaluate and discuss the plugin before merge. Also relevant: #56 (Plugin Granularity), #101 (Work With AWS), #110 (Remove migration-to-aws).
Summary
aws-dev-toolkit is a comprehensive AWS development toolkit plugin for Claude Code, packaging 34 skills, 11 specialized agents, and 3 MCP servers into a single plugin that helps developers build, migrate, and review well-architected applications on AWS.
The plugin targets the full AWS development lifecycle: architecture design, infrastructure-as-code scaffolding, service-specific deep-dives, cost optimization, security review, observability, cloud migrations (GCP→AWS, Azure→AWS), and formal Well-Architected Framework reviews — with mandatory security enforcement on every IaC change and progressive discovery (30+ questions across 5 categories).
Use case
Target users: Developers and solutions architects building on AWS who use Claude Code as their AI coding assistant.
Key use cases:
- Designing AWS architectures following Well-Architected Framework best practices
- Scaffolding IaC projects (CDK, Terraform, SAM, CloudFormation)
- Deep-diving into specific AWS services (Lambda, DynamoDB, ECS, EKS, RDS/Aurora, IoT, SageMaker, etc.)
- Reviewing infrastructure code for security issues and best practices
- Estimating and optimizing AWS costs, including Bedrock token economics
- Planning and executing cloud migrations from GCP or Azure to AWS
- Building AI agents with Strands Agents SDK and Bedrock AgentCore
- Running formal Well-Architected reviews against workloads
- End-to-end SA workflows (discovery → design → security review → cost estimate)
- Side-by-side architecture comparison across cost, complexity, performance, and team fit
- Quick account health checks scanning for top security/cost/reliability issues
- MLOps pipelines — SageMaker training/inference/monitoring, MLflow experiment tracking
- IoT architectures — IoT Core, Greengrass v2 edge compute, fleet provisioning, device security
Before: Developers must manually consult AWS documentation, Well-Architected whitepapers, and pricing pages, then translate guidance into code — context-switching between Claude Code and multiple browser tabs.
After: Developers invoke a skill (e.g., /dynamodb, /security-review, /gcp-to-aws) or let an agent (e.g., cost-optimizer, migration-advisor) handle the research and recommendations inline, with MCP servers providing live AWS context from their account.
Proposal
Plugin structure
plugins/aws-dev-toolkit/
├── .claude-plugin/plugin.json # Plugin manifest (v0.12.0)
├── .mcp.json # 3 MCP server configurations
├── skills/ # 34 skills (each with SKILL.md + references/)
│ ├── Service-specific (19):
│ │ ├── agentcore/ # NEW in v0.12.0
│ │ ├── api-gateway/
│ │ ├── bedrock/ # Renamed from bedrock-cost
│ │ ├── cloudfront/
│ │ ├── dynamodb/
│ │ ├── ec2/
│ │ ├── ecs/
│ │ ├── eks/
│ │ ├── iam/
│ │ ├── iot/ # NEW in v0.12.0
│ │ ├── lambda/
│ │ ├── messaging/
│ │ ├── mlops/ # NEW in v0.12.0
│ │ ├── networking/
│ │ ├── observability/
│ │ ├── rds-aurora/ # NEW in v0.12.0
│ │ ├── s3/
│ │ ├── security-review/
│ │ └── step-functions/
│ └── Workflow & cross-cutting (15):
│ ├── aws-architect/
│ ├── aws-compare/
│ ├── aws-debug/
│ ├── aws-diagram/
│ ├── aws-health-check/
│ ├── aws-migrate/
│ ├── aws-plan/
│ ├── azure-to-aws/
│ ├── challenger/
│ ├── cost-check/
│ ├── customer-ideation/
│ ├── gcp-to-aws/
│ ├── iac-scaffold/
│ ├── strands-agent/
│ └── well-architected/
├── agents/ # 11 specialized agents
│ ├── agentcore-sme.md
│ ├── aws-explorer.md
│ ├── bedrock-sme.md
│ ├── container-sme.md
│ ├── cost-optimizer.md
│ ├── iac-reviewer.md
│ ├── migration-advisor.md
│ ├── networking-sme.md
│ ├── observability-sme.md
│ ├── serverless-sme.md
│ └── well-architected-reviewer.md
└── hooks/hooks.json # Hook definitions
Skills inventory (34 skills)
Service-specific skills (19):
| Skill | Description |
|---|---|
| agentcore | Bedrock AgentCore platform — Runtime, Memory, Gateway, Identity, Policy, multi-agent architectures |
| api-gateway | Design and configure Amazon API Gateway (REST, HTTP, WebSocket APIs) |
| bedrock | Bedrock model selection, agents, guardrails, fine-tuning, cost modeling |
| cloudfront | Design and configure CloudFront distributions, cache behaviors, and edge functions |
| dynamodb | DynamoDB table design, access patterns, GSI/LSI strategies, single-table design |
| ec2 | EC2 instance selection, auto-scaling, Spot instances, and storage optimization |
| ecs | ECS workloads — Fargate vs EC2 launch types, task definitions, deployment strategies |
| eks | EKS clusters — managed node groups, Fargate profiles, IRSA, Karpenter autoscaling |
| iam | IAM policies, roles, permission boundaries, SCPs, Identity Center, Access Analyzer |
| iot | IoT Core MQTT/shadows/rules, Greengrass v2, SiteWise, fleet provisioning, device security |
| lambda | Lambda function design, cold start optimization, concurrency, and deployment |
| messaging | SQS, SNS, EventBridge — event-driven architectures, fan-out, DLQ patterns |
| mlops | SageMaker training/inference/pipelines, MLflow, model monitoring, cost optimization |
| networking | VPC architecture, subnets, security groups, Transit Gateway, Route53 |
| observability | CloudWatch metrics, logs, alarms, dashboards, X-Ray tracing |
| rds-aurora | Engine selection, Aurora vs RDS, Serverless v2, HA topology, RDS Proxy, blue/green |
| s3 | S3 storage strategies, bucket policies, lifecycle policies, performance optimization |
| security-review | Review AWS infrastructure code and configurations for security issues |
| step-functions | Step Functions workflows — saga patterns, parallel tasks, error recovery |
Workflow & cross-cutting skills (15):
| Skill | Description |
|---|---|
| aws-architect | Design and review AWS architectures following Well-Architected Framework principles |
| aws-compare | Side-by-side architecture comparison across cost, complexity, performance, and team fit |
| aws-debug | Debug AWS infrastructure issues, deployment failures, and runtime errors |
| aws-diagram | Mermaid + ASCII architecture diagrams from descriptions or reverse-engineered from IaC |
| aws-health-check | 5-minute account scan catching top security/cost/reliability issues |
| aws-migrate | Orchestrated migration assessment chaining discovery, service mapping, wave planning, and cost estimation |
| aws-plan | End-to-end discovery → design → security review → cost estimate in one flow |
| azure-to-aws | Azure to AWS migration guidance with service mappings, gotchas, and assessment |
| challenger | Adversarial reviewer that stress-tests other agents' outputs for reasoning gaps |
| cost-check | Analyze and optimize AWS costs, investigate unexpected charges |
| customer-ideation | Guide customers from idea to AWS architecture with structured discovery |
| gcp-to-aws | GCP to AWS migration guidance with service mappings, gotchas, and assessment |
| iac-scaffold | Scaffold new IaC projects using CDK, Terraform, SAM, or CloudFormation |
| strands-agent | Scaffold AI agents using Strands Agents SDK with Bedrock AgentCore (TS & Python) |
| well-architected | Formal Well-Architected Framework reviews against the six pillars |
Agents inventory (11 agents)
| Agent | Description |
|---|---|
| agentcore-sme | Bedrock AgentCore expert for production-ready AI agents and multi-agent systems |
| aws-explorer | Read-only AWS environment explorer for understanding deployed resource state |
| bedrock-sme | Bedrock expert emphasizing cost-efficient model selection and agent workflows |
| container-sme | Container expert for ECS, EKS, Fargate orchestration and CI/CD |
| cost-optimizer | Deep cost optimization — rightsizing, Reserved Instances, Savings Plans, data transfer |
| iac-reviewer | Reviews IaC changes for correctness, security, and best practices before deployment |
| migration-advisor | Migration planning — workload assessment, wave planning, dependency mapping |
| networking-sme | VPC design, hybrid connectivity, DNS, CDN, load balancing, and service connectivity |
| observability-sme | CloudWatch, X-Ray, OpenTelemetry monitoring strategies and dashboards |
| serverless-sme | Serverless architecture for Lambda, API Gateway, Step Functions, EventBridge, DynamoDB |
| well-architected-reviewer | Formal WA reviews with evidence-gathering assessment commands |
MCP servers (3 servers)
| Server | Type | Package / URL | Purpose |
|---|---|---|---|
| awsiac | stdio (uvx) | awslabs.aws-iac-mcp-server |
Infrastructure-as-code best practices |
| awsknowledge | HTTP | https://knowledge-mcp.global.api.aws |
AWS architecture decisions and documentation |
| awspricing | stdio (uvx) | awslabs.aws-pricing-mcp-server |
Cost estimation and pricing data |
Additional context
- License: MIT
- No runtime dependencies beyond the 3 MCP servers (which are official AWS Labs packages/endpoints)
- All skill and agent definitions are pure Markdown — no executable code in the plugin itself
- The plugin follows Claude Code's plugin conventions: kebab-case naming, YAML frontmatter on all skills/agents, standard
plugin.jsonmanifest - 33 reference files offload detailed code examples, CLI commands, and policy templates from SKILL.md while keeping guidance self-contained
- Every opinionated recommendation includes concrete justification — cost numbers, failure modes, or operational tradeoffs
- Security enforcement: Every IaC change requires a mandatory security review pass via the
iac-revieweragent - SCP guardrails: The architect skill recommends 6 baseline SCPs (no public SGs on private resources, no unencrypted storage, no public RDS, require IMDSv2, no root access keys, no S3 public access)
- Source repo: https://github.com/rsmets/aws-dev-toolkit (MIT)