ToolTrust
C41/100
alexei-led

aws-mcp-server

mcp1.7.0

@alexei-led

A lightweight service that enables AI assistants to execute AWS CLI commands (in safe containerized environment) through the Model Context Protocol (MCP). Bridges Claude, Cursor, and other MCP-aware AI tools with AWS CLI for enhanced cloud infrastructure management.

By alexei-led | 15 findings | Scanned 3/22/2026 | tooltrust-scanner/v0.1.15

4 High4 Medium7 Low

Security Findings (15)

  • HighInsecure Secret Handling

    aws___get_regional_availability:input parameter "next_token" appears to accept a secret or credential

    Rule: AS-010Fix: Avoid accepting raw credentials as input parameters. Use secret managers (e.g. 1Password CLI, AWS Secrets Manager) and ensure credentials are never logged or stored in agent traces.
  • HighExcessive Permission Surface ×3
    • aws___read_documentation:tool declares network permission
    • aws___recommend:tool declares network permission
    • aws___search_documentation:tool declares network permission
    Rule: AS-002Fix: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
  • MediumExcessive Permission Surface ×4
    • aws___get_regional_availability:tool declares db permission
    • aws___search_documentation:tool declares fs permission
    • aws___search_documentation:tool declares db permission
    • aws___search_documentation:tool declares env permission
    Rule: AS-002Fix: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
  • LowExcessive Permission Surface ×2
    • aws___get_regional_availability:tool declares http permission
    • aws___list_regions:tool declares http permission
    Rule: AS-002Fix: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
  • LowDoS Resilience — Missing Rate Limit / Timeout ×5
    • aws___get_regional_availability:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
    • aws___list_regions:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
    • aws___read_documentation:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
    • aws___recommend:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
    • aws___search_documentation:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
    Rule: AS-011Fix: Declare explicit rate-limit, timeout, and retry configuration for all network and execution tools. Implement exponential back-off and surface resource state to the calling agent.

Scan this tool yourself

Reproduce this audit locally or block risky tools in CI.

Install once, then scan any MCP server:

$ curl -sfL https://raw.githubusercontent.com/AgentSafe-AI/tooltrust-scanner/main/install.sh | bash
$ tooltrust-scanner scan --server "npx -y aws-mcp-server"

Adjust the package name if your npm registry name differs from the tool ID. View source

Add badge to your README

Copy this Markdown to show your ToolTrust grade on GitHub.

[![ToolTrust Grade C](https://raw.githubusercontent.com/AgentSafe-AI/tooltrust-directory/main/docs/badges/grade-c.svg)](https://github.com/AgentSafe-AI/tooltrust-directory)