iam-policy-autopilot

IAM Policy Autopilot is an open-source tool (CLI + MCP server) that performs deterministic static analysis of application code to generate baseline AWS IAM identity-based policies (and optionally help fix AccessDenied errors). It targets building/iterating IAM permissions for application roles using local code inspection.

Evaluated Mar 30, 2026 (21d ago)
Repo ↗ Security aws iam security code-analysis mcp cli policy-generation
⚙ Agent Friendliness
51
/ 100
Can an agent use this?
🔒 Security
60
/ 100
Is it safe for agents?
⚡ Reliability
29
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
75
Documentation
78
Error Messages
0
Auth Simplicity
70
Rate Limits
10

🔒 Security

TLS Enforcement
60
Auth Strength
65
Scope Granularity
55
Dep. Hygiene
55
Secret Handling
60

Security posture appears to rely on AWS credential configuration (not described in detail) and careful human review of generated policies. The README emphasizes reviewing/refining and notes limitations (no resource-based policies; runtime resource inference gaps). The MCP server transport supports stdio (default) or HTTP; TLS usage for HTTP is not specified in the provided content.

⚡ Reliability

Uptime/SLA
0
Version Stability
50
Breaking Changes
20
Error Recovery
45
AF Security Reliability

Best When

You have a relatively deterministic set of AWS SDK calls in the code and you want a fast starting point for IAM identity-based policies that you will review and refine.

Avoid When

Your required permissions depend heavily on dynamic/runtime resource resolution that cannot be inferred from static analysis, or you need non-identity-based policy types (bucket/KMS policies, SCPs, etc.).

Use Cases

  • Generate baseline AWS IAM policy documents from application source code (Python/Go/TypeScript).
  • Use an MCP-enabled AI coding assistant to produce/adjust IAM policies as infrastructure templates are generated.
  • Debug and remediate AccessDenied errors by analyzing denied actions and proposing IAM policy changes.
  • Scope IAM analysis using service hints to reduce unnecessary permissions.

Not For

  • Resource-based policies (e.g., S3 bucket policies, KMS key policies), SCPs/RCPs, or permission boundaries.
  • Correct identification of runtime-dependent resources (e.g., bucket names/ARNs determined only at runtime).
  • Fully automated production policy deployment without human security review.

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: AWS credentials for AWS CLI/API usage (via AWS CLI configuration and AWS_PROFILE/AWS_REGION in MCP server examples).
OAuth: No Scopes: No

The MCP server/CLI appears to use AWS credentials to apply/upload/debug policies, but no API-style auth mechanism (API keys/OAuth scopes) is described for the MCP interface itself. Authentication is likely by underlying AWS credential configuration.

Pricing

Free tier: No
Requires CC: No

Open-source; no hosted pricing details provided in the supplied README/manifest.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • Static analysis may over-include permissions when multiple AWS services share similarly named SDK methods; use --service-hints where possible.
  • The tool does not handle resource-based policies (e.g., S3 bucket policy, KMS key policy) or SCP/RCP/permission boundaries.
  • Runtime-dependent resource ARNs (e.g., bucket names) may not be inferred, so generated policies may require post-review modifications.
  • When using the MCP integration, the coding assistant may further modify the policy beyond the static analysis output—review is required before deployment.
  • fix-access-denied can optionally apply changes (use caution); understand what will be uploaded/applied before granting assistant automation permissions.

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for iam-policy-autopilot.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-03-30.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered