home / skills / partme-ai / full-stack-skills / cloudformation
This skill guides you in creating and managing AWS CloudFormation templates and resources as code, with best practices for scalable infrastructure.
npx playbooks add skill partme-ai/full-stack-skills --skill cloudformationReview the files below or copy the command above to add this skill to your agents.
---
name: cloudformation
description: Provides comprehensive guidance for AWS CloudFormation including template creation, stack management, resources, and best practices. Use when the user asks about CloudFormation, needs to define AWS infrastructure, create CloudFormation templates, or manage AWS resources as code.
license: Complete terms in LICENSE.txt
---
## When to use this skill
Use this skill whenever the user wants to:
- [待完善:根据具体工具添加使用场景]
## How to use this skill
[待完善:根据具体工具添加使用指南]
## Best Practices
[待完善:根据具体工具添加最佳实践]
## Keywords
[待完善:根据具体工具添加关键词]
This skill provides comprehensive guidance for AWS CloudFormation, helping you define, deploy, and manage AWS infrastructure as code. It covers template authoring, stack lifecycle operations, resource configuration, and common troubleshooting. Use it to build repeatable, version-controlled infrastructure and adopt best practices for security and cost control.
The skill inspects your CloudFormation goals and current architecture and then suggests template structures, resource definitions, and parameterization patterns. It generates or reviews CloudFormation YAML/JSON snippets, explains intrinsic functions and mappings, and recommends stack management commands. It also highlights potential pitfalls like circular dependencies, drift, and IAM over-permissioning.
Can this skill produce complete CloudFormation templates?
Yes. It can generate full YAML/JSON templates or focused resource snippets based on your requirements and best practices.
Will it handle template validation and error diagnosis?
It can validate logical structure, point out common syntax and semantic errors, and suggest fixes, but you should run aws cloudformation validate-template and test in non-production first.
How does it help with secrets and credentials?
It recommends using AWS Secrets Manager or SSM Parameter Store and shows how to reference secure parameters in templates rather than embedding sensitive values.