Skip to content

engseclabs/trailtool

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

TrailTool

Pre-aggregated CloudTrail for AI agents and humans. Turns raw CloudTrail logs into queryable entities: People, Sessions, Roles, Services, Resources.

A hosted version is available at trailtool.io.

What It's For

  • Least-privilege IAM policies from actual usage
  • Session investigation — what did this user do, what got denied
  • ClickOps detection — resources created via console instead of IaC

Architecture

CloudTrail S3 → EventBridge → Ingestor Lambda → DynamoDB ← CLI

Quick Start

Deploy the Ingestor

Requires AWS SAM CLI. Deploys a Lambda, 6 DynamoDB tables, and an EventBridge rule.

cd ingestor
sam deploy --parameter-overrides \
  CloudTrailBucketName=your-bucket \
  CloudTrailBucketArn=arn:aws:s3:::your-bucket

Install the CLI

go install github.com/engseclabs/trailtool/cmd/trailtool@latest

Usage

trailtool users list
trailtool sessions list --user alice@example.com --days 7
trailtool sessions detail --start-time "2025-01-15T10:30:00Z"
trailtool sessions summarize --start-time "2025-01-15T10:30:00Z"  # requires Bedrock
trailtool policy generate --role MyRole
trailtool policy generate --role MyRole --include-denied --explain

Using with AI Agents

TrailTool's pre-aggregated data model means agents get concise, structured answers instead of raw log dumps. Example prompts:

Remove unused permissions from IAM policies for roles assumable by Identity Center users.

Add permissions for AccessDenied events on roles assumable by Identity Center users.

License

MIT

About

Open source CLI for AWS CloudTrail analysis — least-privilege IAM policies, session inspection, and Identity Center visibility

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors