npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

@ktmcp-cli/awscloudtrail

v1.0.0

Published

Production-ready CLI for AWS CloudTrail Audit Logging API - Kill The MCP

Readme

"Six months ago, everyone was talking about MCPs. And I was like, screw MCPs. Every MCP would be better as a CLI."

Peter Steinberger, Founder of OpenClaw Watch on YouTube (~2:39:00) | Lex Fridman Podcast #491

AWS CloudTrail CLI

Production-ready CLI for the AWS CloudTrail Audit Logging API. Manage trails, look up API events, and configure Insights from your terminal.

Installation

npm install -g @ktmcp-cli/awscloudtrail

Configuration

awscloudtrail config set --access-key-id YOUR_ACCESS_KEY_ID \
  --secret-access-key YOUR_SECRET_ACCESS_KEY \
  --region us-east-1

Usage

Config

# Set AWS credentials
awscloudtrail config set --access-key-id <id> --secret-access-key <secret> --region us-east-1

# Get a config value
awscloudtrail config get region

# List all config
awscloudtrail config list

Trails

# List all trails
awscloudtrail trails list

# Get trail details
awscloudtrail trails get my-audit-trail

# Get trail logging status
awscloudtrail trails status my-audit-trail

# Create a new trail
awscloudtrail trails create \
  --name production-audit-trail \
  --s3-bucket my-cloudtrail-logs \
  --multi-region \
  --log-validation

# Start logging
awscloudtrail trails start-logging my-audit-trail

# Stop logging
awscloudtrail trails stop-logging my-audit-trail

# Delete a trail
awscloudtrail trails delete my-audit-trail

# JSON output
awscloudtrail trails list --json

Events

# Look up recent events (last 90 days)
awscloudtrail events lookup

# Filter by time range
awscloudtrail events lookup \
  --start-time 2024-01-01T00:00:00Z \
  --end-time 2024-01-31T23:59:59Z

# Filter by event name
awscloudtrail events lookup \
  --attribute-key EventName \
  --attribute-value DeleteBucket

# Filter by username
awscloudtrail events lookup \
  --attribute-key Username \
  --attribute-value john.doe

# Filter by access key
awscloudtrail events lookup \
  --attribute-key AccessKeyId \
  --attribute-value AKIAIOSFODNN7EXAMPLE

# Get event selectors
awscloudtrail events selectors my-audit-trail

# JSON output
awscloudtrail events lookup --json

Insights

# Get insight configuration for a trail
awscloudtrail insights get my-audit-trail

# Enable API call rate insights
awscloudtrail insights enable my-audit-trail --type ApiCallRateInsight

# Enable API error rate insights
awscloudtrail insights enable my-audit-trail --type ApiErrorRateInsight

# List recent insight events
awscloudtrail insights list
awscloudtrail insights list --max-results 50 --json

Event Attribute Keys

Use these with --attribute-key for filtering events:

  • EventId — Unique event ID
  • EventName — API call name (e.g. DescribeInstances)
  • ReadOnlytrue or false
  • Username — IAM user or role name
  • ResourceType — AWS resource type
  • ResourceName — AWS resource name or ARN
  • EventSource — AWS service (e.g. s3.amazonaws.com)
  • AccessKeyId — The access key used

JSON Output

All commands support --json:

# Get all events as JSON and filter with jq
awscloudtrail events lookup --json | jq '.[] | {time: .EventTime, name: .EventName, user: .Username}'

# Find all DeleteBucket events
awscloudtrail events lookup --attribute-key EventName --attribute-value DeleteBucket --json

License

MIT