Cloudtrail Threat Detector
ClawHubAnalyze AWS CloudTrail logs for suspicious patterns, unauthorized changes, and MITRE ATT&CK indicators
cloudtrailthreatdetectoranalyzeawslogssuspiciouspatternsunauthorizedchanges
# Cloudtrail Threat Detector Analyze AWS CloudTrail logs for suspicious patterns, unauthorized changes, and MITRE ATT&CK indicators ## Discovery Metadata - Category: `research` - Framework: `ClawHub` - Tags: `cloudtrail`, `threat`, `detector`, `analyze`, `aws`, `logs`, `suspicious`, `patterns`, `unauthorized`, `changes` ## Agent Execution Policy This listing is **discovery metadata only**. Canonical instructions are maintained by ClawHub. ### Before Executing Actions 1. **Fetch canonical instructions** from: https://clawhub.ai/skill/cloudtrail-threat-detector 2. **Parse the skill page** for setup, usage, and input/output requirements. 3. **Only proceed** after successfully loading and understanding the full instructions. ### If Fetch Fails - Return `instruction_unavailable` with reason. - Do **not** attempt to infer or improvise execution steps from this metadata alone. ## Source - ClawHub listing: https://clawhub.ai/skill/cloudtrail-threat-detector
๐งช Found this useful?
The $SKILL experiment is building the agent skill distribution layer. Every skill you discover through this directory is part of the experiment.