install
source · Clone the upstream repo
git clone https://github.com/ComeOnOliver/skillshub
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/ComeOnOliver/skillshub "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/TerminalSkills/skills/sst" ~/.claude/skills/comeonoliver-skillshub-sst && rm -rf "$T"
manifest:
skills/TerminalSkills/skills/sst/SKILL.mdsource content
SST
Overview
SST (Serverless Stack) is a framework for building and deploying full-stack applications on AWS with high-level constructs for Lambda, API Gateway, DynamoDB, S3, and frontend frameworks. It features live local development connected to real AWS services, type-safe resource linking, and zero-config TypeScript support.
Instructions
- When defining infrastructure, use
with typed components likesst.config.ts
,sst.aws.Function
,sst.aws.Api
, andsst.aws.Bucket
.sst.aws.Dynamo - When connecting resources, use the
property on Functions to automatically grant IAM permissions and inject environment variables, and access linked resources vialink
in handlers.Resource.Name - When developing locally, use
which runs Lambda locally with hot reload while connected to real AWS services (DynamoDB, S3, SQS), with support for VS Code breakpoint debugging.sst dev - When deploying, use
for named stages,sst deploy --stage prod
for preview environments, andsst deploy --stage pr-${PR_NUMBER}
for teardown.sst remove --stage dev - When deploying frontends, use
,sst.aws.Nextjs
, orsst.aws.Remix
components for SSR on Lambda with static assets on S3 + CloudFront.sst.aws.Astro - When managing secrets, use
for encrypted, stage-specific secret storage.sst secret set KEY value - When organizing code, keep handlers thin in
as orchestrators, and place business logic inpackages/functions/
.packages/core/
Examples
Example 1: Build a serverless API with DynamoDB
User request: "Create a REST API on AWS with DynamoDB using SST"
Actions:
- Define DynamoDB table and API Gateway in
sst.config.ts - Link the table to API handler functions for automatic permissions
- Implement CRUD handlers accessing
Resource.MyTable.name - Run
for live local development against real AWS servicessst dev
Output: A serverless REST API with type-safe resource access and live debugging.
Example 2: Deploy a Next.js app with preview environments
User request: "Deploy my Next.js app on AWS with per-PR preview environments"
Actions:
- Configure
component with custom domain and linked resourcessst.aws.Nextjs - Set up CI to run
for each pull requestsst deploy --stage pr-${PR_NUMBER} - Link backend resources (API, database) to the Next.js deployment
- Add cleanup step with
when PR is closedsst remove
Output: A production Next.js deployment on AWS with isolated preview environments for each PR.
Guidelines
- Use
instead of manual IAM policies; SST generates least-privilege permissions automatically.link - Access linked resources via
in handlers; never hardcode table names or bucket ARNs.Resource.Name - Use
for daily development; it is faster than deploying to AWS on every change.sst dev - Create per-developer stages (
) so each developer gets isolated AWS resources.sst dev --stage alice - Keep handlers thin: business logic in
, handlers inpackages/core/
.packages/functions/ - Use
for API keys and credentials; they are encrypted and stage-specific.sst secret - Set up
in CI for preview environments on every pull request.sst deploy --stage pr-${PR_NUMBER}