The "safe" part is where most agentic cloud tools die — giving an LLM write access to AWS is a blast radius conversation most people skip. A pattern that's worked for us on similar client engagements: the agent only ever generates Terraform/CDK diffs, never calls the SDK directly, and a human or a policy check (OPA) gates the apply. You get the remediation speed without the "agent drops a bucket at 3am" risk. How are you scoping IAM for the agent's read path — SecurityAudit + ReadOnlyAccess, or something tighter?