S3 Existing Bucket creates IAM role

When trying to create a s3 trigger on an existing bucket, serverless needs to create an IAM role in the background, however there is no way (so it seems) to attach a permission boundary to this new role. Thus how is this useful? My serverless deploy user is ofc restricted by a permission boundary to prevent privilege escalation attacks yet to attach a trigger to an existing bucket requires than my serverless user is allowed to create IAM roles without any boundary? :man_facepalming: