Use AI agents on your cloud with no risk
Wrap any command with short-lived, scoped AWS credentials in under 5 seconds so coding agents can deploy and test without full access.
Install
What is Audex?
Audex is a Rust CLI that wraps any command with temporary, scoped AWS credentials via STS. Credentials are auto-revoked on exit. Every session gets an immutable audit trail. No admin keys, no permanent access, no YOLO.
--allow "s3:GetObject,lambda:UpdateFunctionCode" — nothing more, nothing less. --budget 5. Audex monitors Cost Explorer and kills sessions that exceed the cap. audex "read from the uploads bucket" and the intent parser generates the minimum policy automatically. Why Audex
[*] Credentials issued in <5 seconds. Action-level scoping. Auto-expire + revoke. Per-session budget caps. Per-session JSONL audit. Built with Rust for zero runtime dependencies.
1. Scope
Specify allowed AWS actions, TTL, and budget. Or use natural language and let the intent parser figure it out.
2. Run
Audex calls STS AssumeRole with an inline policy. Temporary credentials are injected as environment variables.
3. Execute
Your command runs with exactly the permissions it needs. Nothing more. Budget and TTL are enforced in real time.
4. Revoke
Process exits — credentials are revoked immediately. Session audit log is finalized. Zero residual access.
Works with
Audex wraps any command. These are the agents teams use it with.
Quick Reference
FAQ
What is Audex?
How is this different from just using IAM roles?
What agents does it work with?
tryaudex run.What's the natural language scoping?
audex "read from the uploads bucket". The intent parser (powered by Claude) generates the minimum IAM policy automatically. It shows you the blast radius and waits for confirmation before issuing credentials.How does budget enforcement work?
--budget 5 to set a per-session spend cap in USD. Audex polls AWS Cost Explorer and kills the session if spend exceeds the limit. Note: Cost Explorer has a ~24 hour delay, so real-time enforcement uses CloudWatch billing alarms as a backstop.Do my credentials leave my machine?
What AWS permissions does Audex need?
sts:AssumeRole on the target role, plus ce:GetCostAndUsage if you use budget caps. The target role needs a trust policy that allows your IAM identity to assume it. That's it — no admin access, no broad permissions.Is it open source?
Does it support GCP or Azure?
How do I get started?
cargo install tryaudex, configure your IAM role with audex login, then run tryaudex run --allow "s3:GetObject" -- your-command. The docs have a full quickstart guide.