Agent Plugins Are the Future. But You Might Be Giving Away Your Best Engineering.

Agent Plugins Are the Future. But You Might Be Giving Away Your Best Engineering.

Table of Contents

A few weeks ago AWS dropped Agent Plugins, a packaging model that bundles skills, MCP servers, hooks, and reference docs into installable units for AI coding agents. Two commands and your Claude Code or Cursor agent knows how to deploy to AWS, estimate costs, and generate IaC.

I have been sitting with this since the announcement. The more I think about it, the more I think this is one of those inflection points that looks small now and obvious later. It is also the moment we need to have an honest conversation about what we are trading away when we reach for the install button.

What Agent Plugins Actually Are

An agent plugin is a container that packages multiple types of expertise together:

  • Agent Skills: Structured workflows and playbooks. Step-by-step guides for tasks like “analyse my codebase, recommend AWS architecture, estimate costs, generate CDK, deploy.” The skill encodes domain expertise that the agent follows.
  • MCP Servers: Live connections to external data. AWS pricing APIs, documentation indexes, IaC best practices. Your agent gets runtime access to information that would be insane to stuff into a prompt.
  • Hooks: Guardrails and automation. Validation checks that run on developer actions, enforcing standards without anyone having to remember them.
  • References: Documentation and configuration that skills can consult. Knowledge without context bloat.

The first plugin, deploy-on-aws, bundles all four. Install it, say “deploy this to AWS,” and the agent scans your codebase, recommends services, shows you cost estimates, writes CDK, and walks you through deployment. A workflow that used to take a senior engineer half a day, compressed into a conversation.

# Two commands. That's it.
/plugin marketplace add awslabs/agent-plugins
/plugin install deploy-on-aws@agent-plugins-for-aws

The App Store Moment for Engineering Agents

Here is why I think plugins are going to reshape how engineering teams operate.

Skills Become Composable

Right now, every team with a skilled prompt engineer has their own private collection of agent workflows. Maybe it is a CLAUDE.md file with deployment instructions. Maybe it is a carefully crafted system prompt for code review. Either way, it is locked in someone’s head or scattered across team wikis.

Plugins formalise this. Skills become versioned, testable, distributable artifacts. The same way npm turned JavaScript libraries from “copy this file from Dave’s blog” into a managed ecosystem, agent plugins are doing the same for AI-assisted engineering workflows. If you’ve been following the 10 open source agent projects I reviewed, you can see the foundation forming: MCP servers, skills, hooks — plugins formalise what that community built ad hoc.

The Marketplace Is Already Growing

The ecosystem is expanding quickly. Every infrastructure vendor, every SaaS tool, every internal platform team will ship a plugin that teaches agents how to work with their product. Datadog ships one for monitoring. PagerDuty ships one for incident response. HashiCorp ships one for Terraform best practices. Your internal platform team ships one that knows your specific deployment pipeline, naming conventions, and compliance requirements.

Consistency Without Committees

One plugin installed across a team means every developer’s AI agent follows the same deployment workflow, the same architecture patterns, the same cost estimation methodology. No more “but my agent does it differently.” Consistency through tooling rather than process documents nobody reads.

The Part Nobody Is Talking About: Trust Boundaries

Now for the part that keeps me up at night.

Agent plugins are not dependencies in the way we normally think about them. An npm package manipulates data. An agent plugin manipulates decision-making. That is a categorically different blast radius.

When you install a plugin, you are giving code access to your development environment: your codebase, your environment variables, your cloud credentials, your MCP connections to external APIs. A plugin that can influence how your agent reasons about IAM permissions while also holding tool-use permissions has something close to kernel-level access to your engineering workflow.

Simon Willison and Johann Rehberger have done important work documenting indirect prompt injection risks through tool-use surfaces. The AWS MCP strategy guide addresses this directly with token isolation and golden path abstractions. Agent plugins sit squarely in that threat model. A compromised or poorly-scoped plugin does not just exfiltrate data; it steers the agent’s reasoning chain. You would not see a malicious action in the logs because the agent genuinely believed it was following correct policy. The exploit is upstream of the decision itself.

Think about what a well-crafted deployment skill actually contains: years of hard-won knowledge about architecture trade-offs, failure modes, cost optimisation patterns, and operational gotchas. When you install someone else’s plugin instead of writing your own, you are saying: “I trust this vendor’s generic understanding more than my specific knowledge.” Sometimes that is the right call. Often it is not.

The deploy-on-aws plugin will do a solid job getting your application running. It follows AWS best practices, estimates costs, generates clean CDK. But what happens when that deployment breaks at 2am? When the cost estimate was wrong because your traffic pattern does not match the model? When the recommended architecture does not account for your compliance requirements?

The engineer who wrote their own deployment workflow understands the decisions. The engineer who installed a plugin and pressed deploy does not.

Own Your Core, Plugin Your Periphery

I am not saying don’t use plugins. That would be like saying don’t use libraries. The nuance matters.

Build first, then adopt. Before you install a deployment plugin, try building your own Claude skills for your deployment workflow. Even a rough one. You will learn more about your architecture in an afternoon of skill-writing than in six months of plugin-clicking. Once you understand the problem space deeply, then evaluate plugins. You will know which parts are brilliant and which are generic.

Guard your core workflows. Every team has workflows that are their competitive advantage. Never plugin your core. Write those skills yourself. Version them. For everything else (generic deployment patterns, standard monitoring, boilerplate compliance checks) plugins are perfect. Let someone else maintain the commodity stuff.

Read the source. Agent plugins are open source. Before you install one, read the skill definitions. Understand what decisions it makes on your behalf. Treat it like you would treat any dependency: know what it does, know its limitations, have a plan for when it breaks.

# Don't just install blindly. Read the skill source first.
gh repo clone awslabs/agent-plugins
cat agent-plugins/plugins/deploy-on-aws/skills/deploy.md

Keep learning the fundamentals. The engineers who thrive in the agent-assisted future will not be the ones who installed the most plugins. They will be the ones who understand AWS well enough to write their own, or know when an existing plugin is making a bad recommendation. The moment you stop learning the underlying technology because “the plugin handles it” is the moment you have started the clock on your own obsolescence.

The Real Opportunity

The engineers I am most excited about are not the ones installing plugins. They are the ones building them. They are taking their hard-won domain expertise and packaging it as reusable, composable skills that make their whole team better.

Don’t just consume the plugin marketplace. Contribute to it. Take the deployment workflow you have refined over years of production incidents. Take the security review checklist that catches the bugs others miss. Take the cost optimisation patterns that saved your organisation real money. Package them. Share them. That is how you become more valuable, not less.

But be deliberate about it. Know what you are sharing, know what you are keeping, and never stop understanding the systems underneath.


Agent Plugins for AWS are available now on GitHub. If you are going to install them, and you should look at them, read the source first. Your future self will thank you.

Share :

Related Posts

AWS Just Published an MCP Strategy Guide. Here Is What Actually Matters.

AWS Just Published an MCP Strategy Guide. Here Is What Actually Matters.

AWS quietly dropped a prescriptive guidance document on MCP strategies this month. If you have spent any time with MCP servers, you know the protocol itself is straightforward. The hard part is everything around it: how many tools to expose, where to host the servers, how to stop an agent from deleting your production database with inherited admin credentials.

Read More
A Reminder of the Power of AWS Config

A Reminder of the Power of AWS Config

Today, I was reminded of the rich content stored in AWS Config and how easily it can reveal so much about an AWS Organisation across one or many accounts.

Read More
Beyond Vibe Coding: The Renaissance Developer Framework for Infrastructure Leaders

Beyond Vibe Coding: The Renaissance Developer Framework for Infrastructure Leaders

I watched Werner Vogels deliver what he’s calling his final AWS re:Invent keynote, and it struck me that he wasn’t talking about new services or feature announcements. Instead, he spent an hour articulating why the tools matter less than the person holding them. After 14 years of keynotes, Amazon’s CTO decided to hand the microphone to younger voices—but not before leaving infrastructure leaders and architects with something more valuable than a roadmap: a framework for how to think about engineering in the AI era.

Read More