devops-plan

Gather infrastructure context for planning. Returns structured findings for the parent plan command.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "devops-plan" with this command: npx skills add majesticlabs-dev/majestic-marketplace/majesticlabs-dev-majestic-marketplace-devops-plan

DevOps Plan Context

Gather infrastructure context for planning. Returns structured findings for the parent plan command.

When Called

This skill is invoked by /majestic:plan when DevOps keywords are detected in the feature description.

Workflow

  1. Detect IaC Files

Check for existing infrastructure code:

Terraform/OpenTofu

ls .tf infra/.tf terraform/.tf infrastructure/.tf 2>/dev/null

Ansible

ls ansible.cfg playbook.yml ansible/.yml playbooks/.yml 2>/dev/null ls -d roles/ ansible/roles/ 2>/dev/null

Cloud-init

ls cloud-init*.yml user-data*.yml cloud-config*.yml 2>/dev/null

Set flags:

  • HAS_TERRAFORM: true/false

  • HAS_ANSIBLE: true/false

  • HAS_CLOUD_INIT: true/false

  1. Detect Providers

If Terraform files exist, extract providers:

grep -h "provider\s*"" .tf infra/.tf 2>/dev/null | grep -oE '"[a-z]+"' | tr -d '"' | sort -u

Common providers to detect:

  • aws , google , azurerm

  • Major clouds

  • hcloud

  • Hetzner

  • digitalocean

  • DigitalOcean

  • cloudflare

  • Cloudflare

  • backblaze

  • Backblaze B2

  1. Map Skills

Based on detection, recommend skills:

Detection Skill Purpose

Any .tf files majestic-devops:opentofu-coder

HCL patterns, state management

Provider: hcloud

majestic-devops:hetzner-coder

Hetzner-specific resources

Provider: cloudflare

majestic-devops:cloudflare-coder

Cloudflare zones, DNS, Workers

Provider: backblaze

majestic-devops:backblaze-coder

B2 storage patterns

Ansible files majestic-devops:ansible-coder

Playbook patterns

Cloud-init files majestic-devops:cloud-init-coder

VM provisioning

  1. Security Review

If existing IaC files found, run security audit:

Task(subagent_type: "majestic-devops:infra-security-review", prompt: "Audit existing infrastructure code for security issues")

Capture findings for the plan.

  1. Return Context

Return structured context to the calling plan command:

Infrastructure Context

Detected Tools

  • Terraform/OpenTofu: [yes/no] - [version if found]
  • Ansible: [yes/no]
  • Cloud-init: [yes/no]

Providers

[List detected providers]

Skills to Apply

SkillPurpose
majestic-devops:opentofu-coder[reason]
......

Security Findings

[Summary from infra-security-review or "No existing IaC to audit"]

Recommendations

  • [Any specific recommendations based on detection]

Notes

  • This skill gathers context only - no implementation

  • Skills are recommendations, not requirements

  • Security review only runs if IaC files exist

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Coding

google-ads-strategy

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

viral-content

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

market-research

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

free-tool-arsenal

No summary provided by upstream source.

Repository SourceNeeds Review