builder profile is designed for agents that need to actually build things on AWS — provisioning infrastructure, deploying applications, managing IAM, configuring CI/CD pipelines, and debugging production issues. It attaches the AdministratorAccess managed policy to the agent’s EC2 instance role, which means the agent has the same level of access as a human admin in the account.
What builder grants
The builder profile attaches one AWS managed policy to the instance role:| Policy | ARN |
|---|---|
AdministratorAccess | arn:aws:iam::aws:policy/AdministratorAccess |
- Provision and update CloudFormation stacks, CDK apps, and Terraform modules
- Create and configure Lambda functions, ECS tasks, and EC2 instances
- Write to S3, DynamoDB, RDS, and other data services
- Configure IAM roles and policies for the applications it builds
- Read CloudTrail logs to debug issues and trace failures
- Enable and read from GuardDuty, Security Hub, and Inspector findings
When to use builder
Usebuilder when you want the agent to do real work on AWS:
- Building full-stack applications from scratch (API + frontend + data layer)
- Deploying infrastructure from code (CloudFormation, CDK, Terraform)
- Setting up CI/CD pipelines and monitoring
- Debugging production incidents where the agent needs to read logs and apply fixes
- Running overnight infrastructure improvement jobs
Default instance size
Builder defaults to a t4g.xlarge (4 vCPU, 16 GiB RAM, arm64 Graviton). The larger instance matters in practice. When the agent compiles code, runs test suites, builds Docker images, or runs multiple tools in parallel, a t4g.medium will bottleneck. The t4g.xlarge gives it room to work without hitting memory or CPU limits mid-task. You can override this in advanced mode if you have a specific reason, but the xlarge is the right default for builder workloads.Security services
All five AWS security services are enabled by default withbuilder:
| Service | Default |
|---|---|
| Security Hub | On |
| GuardDuty | On |
| Inspector | On |
| Access Analyzer | On |
| Config recorder | On |
Security services have a small additional cost (~$5/month combined at moderate usage). You can disable individual services in advanced mode if you’re running a throwaway sandbox and don’t need them.
Deploy with builder
- OpenClaw
- Claude Code
- Kiro CLI
After deploying
Once the stack is up (~4–10 minutes), connect via SSM and run the essential bootstraps to configure the agent’s skills, memory, and best practices:Connect to the instance
Set a budget alert
Before asking the agent to build anything, set an AWS Budgets alert in the account. The agent will make AWS API calls — know your spend ceiling.