Agent-plugins aws-lambda

Design, build, deploy, test, and debug serverless applications with AWS Lambda. Triggers on phrases like: Lambda function, event source, serverless application, API Gateway, EventBridge, Step Functions, serverless API, event-driven architecture, Lambda trigger. For deploying non-serverless apps to AWS, use deploy-on-aws plugin instead.

install
source · Clone the upstream repo
git clone https://github.com/awslabs/agent-plugins
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/awslabs/agent-plugins "$T" && mkdir -p ~/.claude/skills && cp -r "$T/plugins/aws-serverless/skills/aws-lambda" ~/.claude/skills/awslabs-agent-plugins-aws-lambda && rm -rf "$T"
manifest: plugins/aws-serverless/skills/aws-lambda/SKILL.md
source content

AWS Lambda Serverless Development

Design, build, deploy, and debug serverless applications with AWS serverless services. This skill provides access to serverless development guidance through the AWS Serverless MCP Server, helping you to build production-ready serverless applications with best practices built-in.

Use SAM CLI for project initialization and deployment, Lambda Web Adapter for web applications, or Event Source Mappings for event-driven architectures. AWS handles infrastructure provisioning, scaling, and monitoring automatically.

Key capabilities:

  • SAM CLI Integration: Initialize, build, deploy, and test serverless applications
  • Web Application Deployment: Deploy full-stack applications with Lambda Web Adapter
  • Event Source Mappings: Configure Lambda triggers for DynamoDB, Kinesis, SQS, Kafka
  • Lambda durable functions: Resilient multi-step applications with checkpointing — see the durable-functions skill for guidance
  • Schema Management: Type-safe EventBridge integration with schema registry
  • Observability: CloudWatch logs, metrics, and X-Ray tracing
  • Performance Optimization: Right-sizing, cost optimization, and troubleshooting

When to Load Reference Files

Load the appropriate reference file based on what the user is working on:

Best Practices

Project Setup

  • Do: Use
    sam_init
    or
    cdk init
    with an appropriate template for your use case
  • Do: Set global defaults for timeout, memory, runtime, and tracing (
    Globals
    in SAM, construct props in CDK)
  • Do: Use AWS Lambda Powertools for structured logging, tracing, metrics (EMF), idempotency, and batch processing — available for Python, TypeScript, Java, and .NET
  • Don't: Copy-paste templates from the internet without understanding the resource configuration
  • Don't: Use the same memory and timeout values for all functions regardless of workload

Security

  • Do: Follow least-privilege IAM policies scoped to specific resources and actions
  • Do: Use
    secure_esm_*
    tools to generate correct IAM policies for event source mappings
  • Do: Store secrets in AWS Secrets Manager or SSM Parameter Store, never in environment variables
  • Do: Use VPC endpoints instead of NAT Gateways for AWS service access when possible
  • Do: Enable Amazon GuardDuty Lambda Protection to monitor function network activity for threats (cryptocurrency mining, data exfiltration, C2 callbacks)
  • Don't: Use wildcard (
    *
    ) resource ARNs or actions in IAM policies
  • Don't: Hardcode credentials or secrets in application code or templates
  • Don't: Store user data or sensitive information in module-level variables — execution environments can be reused across different callers

Idempotency

  • Do: Write idempotent function code — Lambda delivers events at least once, so duplicate invocations must be safe
  • Do: Use the AWS Lambda Powertools Idempotency utility (backed by DynamoDB) for critical operations
  • Do: Validate and deduplicate events at the start of the handler before performing side effects
  • Don't: Assume an event will only ever be processed once

For topic-specific best practices, see the dedicated guide files in the reference table above.

Lambda Limits Quick Reference

Limits that developers commonly hit:

ResourceLimit
Function timeout900 seconds (15 minutes)
Memory128 MB – 10,240 MB
1 vCPU equivalent1,769 MB memory
Synchronous payload (request + response)6 MB each
Async invocation payload1 MB
Streamed response200 MB
Deployment package (.zip, uncompressed)250 MB
Deployment package (.zip upload, compressed)50 MB
Container image10 GB
Layers per function5
Environment variables (aggregate)4 KB
/tmp
ephemeral storage
512 MB – 10,240 MB
Account concurrent executions (default)1,000 (requestable increase)
Burst scaling rate1,000 new executions per 10 seconds

Check Service Quotas for your account limits:

aws lambda get-account-settings

Troubleshooting Quick Reference

ErrorCauseSolution
Build Failed
Missing dependenciesRun
sam_build
with
use_container: true
Stack is in ROLLBACK_COMPLETE
Previous deploy failedDelete stack with
aws cloudformation delete-stack
, redeploy
IteratorAge
increasing
Stream consumer falling behindIncrease
ParallelizationFactor
and
BatchSize
. Use
esm_optimize
EventBridge events silently droppedNo DLQ, retries exhaustedAdd
RetryPolicy
+
DeadLetterConfig
to rule target
Step Functions failing silentlyNo retry on Task stateAdd
Retry
with
Lambda.ServiceException
,
Lambda.AWSLambdaException
Durable Function not resumingMissing IAM permissionsAdd
lambda:CheckpointDurableExecution
and
lambda:GetDurableExecutionState
— see durable-functions skill

For detailed troubleshooting, see references/troubleshooting.md.

Configuration

AWS CLI Setup

This skill requires that AWS credentials are configured on the host machine:

Verify access: Run

aws sts get-caller-identity
to confirm credentials are valid

SAM CLI Setup

  1. Install SAM CLI: Follow the SAM CLI installation guide
  2. Verify: Run
    sam --version

Container Runtime Setup

  1. Install a Docker compatible container runtime: Required for
    sam_local_invoke
    and container-based builds
  2. Verify: Use an appropriate command such as
    docker --version
    or
    finch --version

MCP Server Configuration

Write access is enabled by default. The plugin ships with

--allow-write
in
.mcp.json
, so the MCP server can create projects, generate IaC, and deploy on behalf of the user.

Access to sensitive data (like Lambda and API Gateway logs) is not enabled by default. To grant it, add

--allow-sensitive-data-access
to
.mcp.json
.

SAM Template Validation Hook

This plugin includes a

PostToolUse
hook that runs
sam validate
automatically after any edit to
template.yaml
or
template.yml
. If validation fails, the error is returned as a system message so you can fix it immediately. The hook requires SAM CLI and
jq
to be installed; if either is missing, validation is skipped with a system message. Users can disable it via
/hooks
.

Verify: Run

jq --version

Language selection

Default: TypeScript

Override syntax:

  • "use Python" → Generate Python code
  • "use JavaScript" → Generate JavaScript code

When not specified, ALWAYS use TypeScript

IaC framework selection

Default: CDK

Override syntax:

  • "use CloudFormation" → Generate YAML templates
  • "use SAM" → Generate YAML templates

When not specified, ALWAYS use CDK

Serverless MCP Server Unavailable

  • Inform user: "AWS Serverless MCP not responding"
  • Ask: "Proceed without MCP support?"
  • DO NOT continue without user confirmation

Resources