amazon-web-services

Core AWS services for application developers. Covers S3 (storage, presigned URLs, lifecycle), Lambda (functions, layers, cold starts), IAM (roles, policies, least privilege), DynamoDB (single-table design, GSI/LSI, streams), SQS/SNS (queues, topics, fan-out), CloudFront (CDN, caching), RDS/Aurora (Postgres/MySQL, connection pooling), ECR/ECS/Fargate (containers), Route 53 (DNS), Secrets Manager, and CDK v2 (TypeScript IaC, constructs, stacks, testing). Use when building AWS infrastructure, writing CDK stacks, configuring IAM policies, designing DynamoDB tables, setting up Lambda functions, creating S3 presigned URLs, deploying containers on ECS/Fargate, or configuring CloudFront distributions.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "amazon-web-services" with this command: npx skills add oakoss/agent-skills/oakoss-agent-skills-amazon-web-services

Amazon Web Services

Overview

Amazon Web Services (AWS) provides cloud computing services for building scalable applications. The AWS SDK for JavaScript v3 uses modular packages (@aws-sdk/client-*) with first-class TypeScript support. AWS CDK v2 defines infrastructure as code using TypeScript constructs that synthesize to CloudFormation templates.

When to use: Building cloud-native applications, serverless architectures, container deployments, managed databases, CDN distribution, event-driven systems, or infrastructure as code.

When NOT to use: Simple static sites (consider Vercel/Netlify), local-only development tools, projects with no cloud deployment requirement.

Quick Reference

Service / PatternAPI / ConstructKey Points
S3 uploadPutObjectCommandModular import from @aws-sdk/client-s3
S3 presigned URLgetSignedUrl()From @aws-sdk/s3-request-presigner, max 7 days
Lambda functionnew lambda.Function()CDK L2 construct, set memorySize and timeout
Lambda layersnew lambda.LayerVersion()Share code/deps across functions
IAM policynew iam.PolicyStatement()Always use least privilege, avoid * resources
DynamoDB tablenew dynamodb.Table()Single-table design, PAY_PER_REQUEST for variable loads
DynamoDB GSItable.addGlobalSecondaryIndex()Separate throughput, eventual consistency
SQS queuenew sqs.Queue()DLQ for failed messages, long polling with WaitTimeSeconds
SNS topicnew sns.Topic()Fan-out to SQS, Lambda, HTTP endpoints
CloudFrontnew cloudfront.Distribution()OAC for S3 origins, cache policies
RDS/Auroranew rds.DatabaseCluster()Use RDS Proxy for connection pooling
ECS Fargatenew ecs_patterns.ApplicationLoadBalancedFargateService()Higher-level pattern construct
Route 53new route53.ARecord()Alias records for AWS resources
Secrets Managersecretsmanager.Secret.fromSecretNameV2()Automatic rotation, never hardcode secrets
CDK stacknew cdk.Stack(app, 'Id')One stack per deployment unit
CDK testingTemplate.fromStack(stack)Fine-grained assertions and snapshot tests

Common Mistakes

MistakeCorrect Pattern
Using AWS SDK v2 (aws-sdk)Use modular v3 (@aws-sdk/client-*) for smaller bundles
IAM Action: "*" or Resource: "*"Scope to specific actions and resource ARNs
No DLQ on SQS queuesAlways attach a dead-letter queue for failed messages
DynamoDB scan for queriesDesign access patterns first, use Query with GSI/LSI
Hardcoding secrets in code or env varsUse Secrets Manager or SSM Parameter Store
Lambda bundling node_modules without tree-shakingUse NodejsFunction with esbuild bundling
Missing RemovalPolicy on stateful resourcesSet RemovalPolicy.RETAIN for production databases and buckets
Creating one Lambda per CRUD operationGroup related operations, use event routing
No connection pooling for RDSUse RDS Proxy or limit max_connections per Lambda
CloudFront without cache policyDefine explicit CachePolicy to control TTL and headers
CDK testing only with snapshotsCombine fine-grained assertions with snapshot tests
Presigned URL without content-typeInclude ContentType in PutObjectCommand for uploads

Delegation

  • Infrastructure patterns: Use Explore agent for AWS architecture discovery
  • Security review: Use Task agent for IAM policy auditing
  • Cost optimization: Use Task agent for resource right-sizing

If the docker skill is available, delegate container build patterns and Dockerfile optimization to it. If the github-actions skill is available, delegate CI/CD pipeline patterns for AWS deployments to it. If the typescript-patterns skill is available, delegate TypeScript strict mode and type patterns used in CDK code to it. If the application-security skill is available, delegate AWS security best practices and threat modeling to it.

References

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Coding

github-cli

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

tanstack-cli

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

typescript-patterns

No summary provided by upstream source.

Repository SourceNeeds Review