Let AWS fix your cloud configs for you. Point it at a failing CloudFormation stack or misconfigured IAM policy and get a fix PR with infrastructure-as-code diffs, following AWS best practices.
Try Amazon Q Developer →Amazon Q Developer's /dev agents are a genuine productivity multiplier for teams already deep in the AWS ecosystem. If your day involves debugging CloudFormation templates, tightening IAM policies, or wrangling Lambda configurations, this tool can cut hours of toil into minutes. Teams outside AWS, or those running multi-cloud setups, will find the value proposition much thinner; this is purpose-built for AWS-native workflows, and it knows it.
As of April 2026. Check AWS for current tiers.
per month
per user / month (estimated)
Note: The free tier's 50 agentic interactions cap is tight for active infrastructure work. Most teams doing real /dev agent work will hit that limit within the first week.
What the February 2026 /dev agents update actually delivers.
Point the agent at a failing CloudFormation stack and it generates a fix PR with coordinated changes across multiple files. It follows AWS best practices by default, not just syntactic correctness.
Built-in vulnerability detection scans your code and IaC templates for security issues. Catches overly permissive IAM policies, open security groups, and unencrypted resources before they reach production.
The agent reads CloudWatch logs and Lambda execution traces directly. When something breaks, it correlates errors across services and proposes targeted fixes rather than generic suggestions.
Works inside VS Code, JetBrains, and the terminal. Ask it to explain a Terraform module, generate a CDK construct, or autocomplete an AWS CLI command. Context-aware suggestions based on your project structure.
Performs automated code reviews with explanations, not just linting. Generates documentation for existing codebases and can explain complex CloudFormation or CDK stacks in plain language.
Analyzes your infrastructure configs and suggests cost-saving changes. Identifies over-provisioned resources, recommends reserved instance strategies, and flags unused allocations.
And who should probably skip it.
If your entire stack runs on AWS and you manage CloudFormation, CDK, or SAM templates daily, this is the most contextually aware assistant available. It understands your services because it is built by the same company that runs them.
The /dev agent's ability to read a failed stack event, trace the root cause across resources, and generate a multi-file fix PR is genuinely useful. It replaces the tedious cycle of reading error messages, checking docs, and manually editing templates.
If you are a solo dev or small team without a dedicated DevOps person, Q Developer acts as an on-demand infrastructure expert. The free tier's 50 interactions might be enough for lighter workloads.
If you split infrastructure across AWS, GCP, and Azure, the value drops significantly. Q Developer has no meaningful understanding of Terraform providers for other clouds, and its suggestions will consistently steer you toward AWS-native services.
What you need to know before committing.
Start with the free tier on a staging environment. Validate the guardrails before you trust it with production configs.