IAM Policy Autopilot by awslabs
39 score
Analyzes application code locally to automatically generate baseline AWS IAM identity-based policies by detecting AWS SDK calls in Python, Go, and TypeScript applications. Helps AI coding assistants quickly create IAM permissions that can be refined as applications evolve.
Ranked #3161 out of 7754 indexed tools.Has 11 contributors.Actively maintained with commits in the last week.
Is this your tool? Claim this listing to add maintainer context, get a verified badge, and unlock analytics.
Claim listing → Signal Breakdown
Installs 0
Freshness 1d ago
Issue Health 38%
Stars 310
Platform Breadth 1 platform
Contributors 11
Description Detailed
How to Improve
Issue Health high impact
Platforms medium impact
Supported Platforms
From the README
# IAM Policy Autopilot An open source Model Context Protocol (MCP) server and command-line tool that helps your AI coding assistants quickly create baseline IAM policies that you can refine as your application evolves, so you can build faster. IAM Policy Autopilot analyzes your application code locally to generate identity-based policies for application roles, enabling faster IAM policy creation and reducing access troubleshooting time. IAM Policy Autopilot supports applications built in Python, Go, and TypeScript. We want to hear from you. Ask questions or share ideas in [Discussions](https://github.com/awslabs/iam-policy-autopilot/discussions), report bugs through [Issues](https://github.com/awslabs/iam-policy-autopilot/issues), or contribute directly with a [Pull Request](https://github.com/awslabs/iam-policy-autopilot/pulls). ## Table of Contents - [Who is IAM Policy Autopilot for?](#who-is-iam-policy-autopilot-for) - [How is IAM Policy Autopilot helpful?](#how-is-iam-policy-Read full README on GitHub →