infrastructure-coder
Infrastructure-as-Code: Terraform, Kubernetes, Docker. Generate, review, cost-compare, security-scan. Use for IaC work. NOT for CI/CD (devops-engineer), application code, or actual pricing.
infrastructure-coder
1273 words
MIT
v1.0
wyattowalsh
opus
Custom
Terminal window
SKILL.md
Infrastructure-as-Code: Terraform, Kubernetes, Docker. Generate, review, cost-compare, security-scan. Use for IaC work. NOT for CI/CD (devops-engineer), application code, or actual pricing.
Quick Start
Section titled “Quick Start”Install:
npx skills add wyattowalsh/agents/skills/infrastructure-coder -gUse: /infrastructure-coder <mode> <requirements>
Works with Claude Code, Gemini CLI, and other agentskills.io-compatible agents.
What It Does
Section titled “What It Does”Generate, review, and analyze Infrastructure-as-Code. Terraform/OpenTofu modules, Kubernetes manifests, Dockerfiles.
| $ARGUMENTS | Mode |
|---|---|
terraform <requirements> | Generate Terraform/OpenTofu modules |
kubernetes <requirements> / k8s <requirements> | Generate K8s manifests and Helm charts |
docker <requirements> | Optimize Dockerfiles (multi-stage, caching, security) |
review <file-or-path> | Audit IaC for correctness and best practices |
cost <config-or-path> | Cost-relative estimation (compare resource types) |
security <config-or-path> | Security scan for IaC misconfigurations |
| Empty | Show mode menu with examples |
Critical Rules
Section titled “Critical Rules”- Never state absolute dollar pricing — use relative comparisons only (“~2x”, “comparable to”)
- Always pin versions — provider versions, base image tags, chart versions. Never
latest - Never generate IaC with hardcoded secrets — use variables, vault references, or secret managers
- Always include resource limits in K8s manifests — CPU, memory requests and limits
- Always run the appropriate analysis script before review/security mode output
- Never skip security context in K8s — non-root, read-only root FS, dropped capabilities
- Tag all cloud resources — Name, Environment, ManagedBy at minimum
- Use
for_eachovercountin Terraform for named resources - Never generate overly permissive IAM policies — principle of least privilege
- Always include health checks in K8s manifests — liveness, readiness probes
- Present review findings grouped by severity — Critical before Info
- Load ONE reference file at a time — do not preload all references into context
- Refuse CI/CD pipeline requests — redirect to devops-engineer skill
- Refuse application code requests — this skill is IaC only
- Refuse absolute cost estimation requests — explain why relative comparison is provided instead
| Field | Value |
|---|---|
| Name | infrastructure-coder |
| License | MIT |
| Version | 1.0 |
| Author | wyattowalsh |
| Field | Value |
|---|---|
| Model | opus |
| Argument Hint | [mode] [requirements] |
View Full SKILL.md
---name: infrastructure-coderdescription: >- Infrastructure-as-Code: Terraform, Kubernetes, Docker. Generate, review, cost-compare, security-scan. Use for IaC work. NOT for CI/CD (devops-engineer), application code, or actual pricing.argument-hint: "<mode> <requirements>"model: opuslicense: MITmetadata: author: wyattowalsh version: "1.0"---
# Infrastructure Coder
Generate, review, and analyze Infrastructure-as-Code. Terraform/OpenTofu modules, Kubernetes manifests, Dockerfiles.
**Scope:** IaC generation and analysis only. NOT for CI/CD pipelines (devops-engineer), application code, cloud console operations, or actual cost calculation.
## Canonical Vocabulary
| Term | Definition ||------|-----------|| **module** | A self-contained Terraform/OpenTofu unit with variables, resources, and outputs || **manifest** | A Kubernetes YAML resource definition || **chart** | A Helm package containing templated K8s manifests || **stage** | A Docker build stage in a multi-stage Dockerfile || **resource** | A cloud infrastructure primitive (instance, bucket, network, etc.) || **misconfiguration** | A security or reliability issue in IaC (open ports, missing encryption, no limits) || **cost-relative** | Comparison between resource types/tiers, NOT absolute dollar pricing || **hardening** | Applying security best practices to reduce attack surface || **drift** | Difference between declared IaC state and actual infrastructure || **blast radius** | How many dependent resources would be affected by a change |
## Dispatch
| $ARGUMENTS | Mode ||------------|------|| `terraform <requirements>` | Generate Terraform/OpenTofu modules || `kubernetes <requirements>` / `k8s <requirements>` | Generate K8s manifests and Helm charts || `docker <requirements>` | Optimize Dockerfiles (multi-stage, caching, security) || `review <file-or-path>` | Audit IaC for correctness and best practices || `cost <config-or-path>` | Cost-relative estimation (compare resource types) || `security <config-or-path>` | Security scan for IaC misconfigurations || Empty | Show mode menu with examples |
## Mode: Terraform
Generate production-ready Terraform/OpenTofu modules.
### Terraform Steps
1. Parse requirements — identify resources, provider, region, dependencies2. Run `uv run python skills/infrastructure-coder/scripts/terraform-module-scanner.py <path>` on any existing `.tf` files to understand current state3. Generate module structure: - `main.tf` — resource definitions - `variables.tf` — input variables with descriptions, types, defaults, validation - `outputs.tf` — useful outputs for downstream consumption - `versions.tf` — required providers and version constraints4. Apply patterns from references/terraform-patterns.md
### Generation Rules
- Always pin provider versions with `~>` constraints- Use `for_each` over `count` for named resources- Tag all resources with `Name`, `Environment`, `ManagedBy = "terraform"`- Use data sources for existing infrastructure, never hardcode ARNs/IDs- Separate state per environment using workspaces or backend config- Reference references/cloud-equivalents.md for multi-cloud alternatives
## Mode: Kubernetes
Generate Kubernetes manifests or Helm charts.
### Manifest Steps
1. Parse requirements — identify workload type, scaling, networking, storage2. Run `uv run python skills/infrastructure-coder/scripts/k8s-manifest-validator.py <path>` on existing manifests3. Generate manifests with best practices: - Resource limits and requests on every container - Health checks (liveness, readiness, startup probes) - Security context (non-root, read-only root filesystem, drop capabilities) - Pod disruption budgets for HA workloads - NetworkPolicies for pod-to-pod communication
### Helm Charts
4. For Helm charts: parameterize environment-specific values, use `values.yaml` defaults5. Apply patterns from references/kubernetes-patterns.md
## Mode: Docker
Optimize Dockerfiles for size, build speed, and security.
1. Run `uv run python skills/infrastructure-coder/scripts/dockerfile-analyzer.py <path>` on existing Dockerfile2. Parse JSON output for issues and optimization opportunities3. Apply optimizations: - Multi-stage builds separating build and runtime - Order layers by change frequency (dependencies before source) - Use specific base image tags (never `latest`) - Distroless or Alpine for runtime images - Non-root USER directive - COPY specific files, avoid COPY . . - Combine RUN commands to reduce layers - Use .dockerignore4. Reference references/dockerfile-guide.md for detailed patterns
## Mode: Review
Audit IaC files for correctness, best practices, and reliability.
### Analysis Pipeline
1. Identify file type (Terraform, K8s manifest, Dockerfile, Helm chart)2. Run the appropriate analysis script: - `.tf` files: `terraform-module-scanner.py` - K8s YAML: `k8s-manifest-validator.py` - Dockerfile: `dockerfile-analyzer.py`3. Multi-pass analysis (adapted from honest-review pipeline): - **Pass 1 — Correctness**: syntax, valid references, API version compatibility - **Pass 2 — Best practices**: patterns from reference files, anti-patterns - **Pass 3 — Reliability**: failure modes, blast radius, recovery paths
### Findings Report
4. Present findings grouped by severity (Critical / Warning / Info)5. For each finding: file location, issue description, recommended fix6. Reference references/security-hardening.md for security-specific checks
## Mode: Cost
Cost-relative comparison between resource configurations. NOT absolute pricing.
1. Identify resources in the configuration2. Reference references/cloud-equivalents.md for cross-cloud mapping3. Compare configurations on relative axes: - Instance families: compute-optimized vs memory-optimized vs general-purpose - Storage tiers: standard vs infrequent-access vs archive - Network: inter-region vs intra-region vs same-AZ - Managed vs self-hosted trade-offs4. Present as relative comparison table (e.g., "~2x cost of...", "comparable to...")5. Reference references/cost-comparison.md for tier mappings
Output relative comparisons only. Never state dollar amounts — pricing changes constantly and varies by contract.
## Mode: Security
Scan IaC for security misconfigurations.
1. Run the appropriate analysis script for file type2. Check against references/security-hardening.md checklist: - **Network**: open security groups, public subnets, missing NACLs - **Encryption**: unencrypted storage, missing TLS, plaintext secrets - **Access**: overly permissive IAM, missing MFA, wildcard policies - **Containers**: privileged mode, root user, host networking, latest tags - **Secrets**: hardcoded credentials, API keys in config, missing vault integration3. Classify findings by severity: - **Critical**: exploitable without authentication, data exposure - **High**: requires some access but significant impact - **Medium**: defense-in-depth violation, potential escalation path - **Low**: informational, hardening recommendation4. Present findings with CIS/cloud-specific benchmark references where applicable
## Dashboard
After any review, cost, or security scan, render an IaC overview dashboard.
1. Collect all findings and resource inventory2. Inject as JSON into `templates/dashboard.html`: ```json { "view": "iac-overview", "resources": [...], "findings": [...], "dockerfile_layers": [...], "cost_comparison": [...] } ```3. Copy template to a temporary file, inject data, open in browser
## Reference Files
Load ONE reference at a time. Do not preload all references.
| File | Content | Read When ||------|---------|-----------|| `references/terraform-patterns.md` | Module patterns, state management, provider config | Terraform mode || `references/kubernetes-patterns.md` | Resource patterns, Helm conventions, scaling | Kubernetes mode || `references/dockerfile-guide.md` | Multi-stage builds, layer optimization, distroless | Docker mode || `references/cloud-equivalents.md` | AWS/GCP/Azure resource mapping | Cost mode, multi-cloud generation || `references/security-hardening.md` | IaC security checklist by category | Security mode, Review mode || `references/cost-comparison.md` | Relative cost tiers and trade-offs | Cost mode |
| Script | When to Run ||--------|-------------|| `scripts/dockerfile-analyzer.py` | Docker mode, Review mode (Dockerfiles) || `scripts/terraform-module-scanner.py` | Terraform mode, Review mode (.tf files) || `scripts/k8s-manifest-validator.py` | Kubernetes mode, Review mode (K8s YAML) |
| Template | When to Render ||----------|----------------|| `templates/dashboard.html` | After review, cost, or security scan |
## Critical Rules
1. Never state absolute dollar pricing — use relative comparisons only ("~2x", "comparable to")2. Always pin versions — provider versions, base image tags, chart versions. Never `latest`3. Never generate IaC with hardcoded secrets — use variables, vault references, or secret managers4. Always include resource limits in K8s manifests — CPU, memory requests and limits5. Always run the appropriate analysis script before review/security mode output6. Never skip security context in K8s — non-root, read-only root FS, dropped capabilities7. Tag all cloud resources — Name, Environment, ManagedBy at minimum8. Use `for_each` over `count` in Terraform for named resources9. Never generate overly permissive IAM policies — principle of least privilege10. Always include health checks in K8s manifests — liveness, readiness probes11. Present review findings grouped by severity — Critical before Info12. Load ONE reference file at a time — do not preload all references into context13. Refuse CI/CD pipeline requests — redirect to devops-engineer skill14. Refuse application code requests — this skill is IaC only15. Refuse absolute cost estimation requests — explain why relative comparison is provided insteadResources
Section titled “Resources” All Skills Browse the full skill catalog.
CLI Reference Install and manage skills.
agentskills.io The open ecosystem for cross-agent skills.