Coming soon · Join the waitlist

Ask Claude what's broken
in your AWS account

TroveSec scans your cloud environment and exposes the findings as tools inside Claude Desktop. Real answers, grounded in real data — not guesses.

No spam. Early access only. Unsubscribe anytime.

What TroveSec does

Scans your AWS account

Connects via a read-only IAM role. Runs 400+ security checks using Prowler. Takes about 3 minutes.

Maps to SOC2 controls

Every finding is automatically mapped to the relevant SOC2 trust criterion — CC6.1, CC7.2, and so on.

Answers questions in Claude

Connects to Claude Desktop via MCP. Ask security questions in plain English. Get answers about your real environment.

What it looks like in Claude Desktop

Claude Desktop — TroveSec MCP
What are my most critical AWS security findings right now?
U
C
I found 4 critical findings in your Production account:
  1. S3 bucket prod-user-uploads is publicly readable — enable Block Public Access
  2. IAM role deploy-bot has AdministratorAccess, unused for 142 days
  3. RDS prod-db has no encryption at rest (CC6.7)
  4. CloudTrail disabled in us-west-2 (CC7.2)
Which of these block my SOC2 audit?
U
C
All 4 are blockers. They map to:
CC6.1access controls ·CC6.7data protection ·CC7.2monitoring

Want me to generate a prioritised remediation plan with exact CLI commands?