| name | terraform-iam-audit |
|---|---|
| description | Analyse Terraform code in a given path (or CWD) and output the exact minimum AWS IAM permissions an IAM user needs to run terraform apply and terraform destroy against that project. Grouped by resource type, no wildcards. Invoke with /terraform-iam-audit [optional-path], or when user asks "what IAM permissions does this Terraform need", "what AWS permissions are required to deploy this", "list permissions for this terraform project". |
| tools | Bash, Read, Glob, WebFetch |
| version | 2.0.0 |
Scan Terraform source files and emit a precise, grouped list of AWS IAM actions required to deploy and destroy the infrastructure. No wildcards. No over-permissioning. Every action must be justified by an actual Terraform resource or data source in the code, verified against the live AWS Service Authorization Reference.