aws-core-mcp-server

MCP server integration layer intended to expose AWS-related capabilities to an MCP-capable agent/runtime (e.g., for listing/querying AWS resources and/or performing AWS actions) via the Model Context Protocol.

Evaluated Apr 04, 2026 (22d ago)
Homepage ↗ Repo ↗ Infrastructure ai-ml devtools infrastructure api mcp aws
⚙ Agent Friendliness
37
/ 100
Can an agent use this?
🔒 Security
50
/ 100
Is it safe for agents?
⚡ Reliability
28
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
55
Documentation
40
Error Messages
0
Auth Simplicity
55
Rate Limits
20

🔒 Security

TLS Enforcement
70
Auth Strength
50
Scope Granularity
35
Dep. Hygiene
40
Secret Handling
50

Security posture depends heavily on how the MCP server is configured and where it runs. Critical factors (not verifiable from the provided info) include: enforcing HTTPS for any MCP transport, ensuring AWS credentials are not logged, and constraining IAM permissions and tool coverage to prevent the agent from performing unintended high-impact actions. AWS APIs may require robust handling of access denied and throttling errors.

⚡ Reliability

Uptime/SLA
0
Version Stability
50
Breaking Changes
30
Error Recovery
30
AF Security Reliability

Best When

You want an MCP-native way to give an agent controlled access to AWS operations in a specific account/region with least-privilege IAM and clear operational guardrails.

Avoid When

You cannot ensure secure credential handling for the MCP server or you need strong guarantees around tool-level restrictions and auditing before allowing an agent to call AWS APIs.

Use Cases

  • Allowing an AI agent to interact with AWS environments through MCP tools
  • Automating common AWS workflows (inventory, discovery, operational tasks) from within an agent
  • Bridging an agent framework to AWS SDK/API calls through MCP

Not For

  • Direct production automation without reviewing permissions and safety controls
  • Use cases requiring a full AWS console replacement UI
  • Environments where the MCP server cannot be deployed/secured under the organization’s network and IAM controls

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: AWS credentials (e.g., IAM user/role access keys or assumed role) required by AWS SDK
OAuth: No Scopes: No

Specific MCP auth mechanism (if any) is not provided here; AWS authentication likely relies on standard AWS credential resolution (env/role/keys) configured for the server process.

Pricing

Free tier: No
Requires CC: No

No pricing information provided; AWS API usage would typically incur AWS charges depending on the actions performed.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • Tool calls may require region/account context; missing or incorrect configuration can cause failed AWS requests
  • AWS permissions must be least-privilege; overly broad IAM roles increase blast radius
  • Some AWS operations are not naturally idempotent; agent retries can create duplicates if not handled carefully
  • Agents may unintentionally enumerate sensitive resources if discovery tools are broadly exposed

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for aws-core-mcp-server.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-04-04.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered