Not able to attach IAM policy to lab user (kk_lab_user_284103) leading issue on further assigning service role to cloudbuild

I required below policy to be applied on my lab user,

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Action": [
        "iam:CreateRole",
        "iam:PutRolePolicy",
        "iam:AttachRolePolicy",
        "iam:PassRole"
      ],
      "Resource": "*"
    }
  ]
}

which is not happening,

I required this for the cloud build service role to assume below roles, doing the tasks on my behalf.

AWSTemplateFormatVersion: '2010-09-09'
Description: Create an AWS CodeBuild Project with CodeCommit Integration and Secret Manager Access

Resources:
  DevSecOpsCodeBuildRole:
    Type: 'AWS::IAM::Role'
    Properties:
      RoleName: CodeBuildRole
      AssumeRolePolicyDocument:
        Version: '2012-10-17'
        Statement:
          - Effect: Allow
            Principal:
              Service: codebuild.amazonaws.com
            Action: sts:AssumeRole
      Policies:
        - PolicyName: CodeBuildPolicy
          PolicyDocument:
            Version: '2012-10-17'
            Statement:
              - Effect: Allow
                Action:
                  - s3:GetObject
                  - s3:GetObjectVersion
                Resource: '*'
              - Effect: Allow
                Action:
                  - secretsmanager:GetSecretValue
                Resource: '*'
              - Effect: Allow
                Action:
                  - logs:CreateLogGroup
                  - logs:CreateLogStream
                  - logs:PutLogEvents
                Resource: 'arn:aws:logs:*:*:*'
              - Effect: Allow
                Action:
                  - codecommit:GitPull
                Resource: '*'
  DevSecOpsCodeBuildProject:
    Type: 'AWS::CodeBuild::Project'
    Properties:
      Name: DevSecOps_DAST_Scan_Build_CF
      ServiceRole: !GetAtt DevSecOpsCodeBuildRole.Arn
      Source:
        Type: CODECOMMIT
        Location: 'https://git-codecommit.us-east-1.amazonaws.com/v1/repos/DevSecOps_DAST_Scan_Repo_CF'
        GitCloneDepth: 1
        BuildSpec: 'buildspec.yml'
      SourceVersion: refs/heads/main
      Artifacts:
        Type: NO_ARTIFACTS
      Environment:
        Type: LINUX_CONTAINER
        ComputeType: BUILD_GENERAL1_SMALL
        Image: aws/codebuild/standard:4.0
Outputs:
  DevSecOpsCodeBuildProjectName:
    Description: Name of the CodeBuild project
    Value: !Ref DevSecOpsCodeBuildProject

Please check this issue

@support team, any update on this?

IAM is very limited in playground. I suspect because if it was not, it could enable privilege escalation which would open the playground up to abuse.