Analyze configuration management and environment settings to identify security risks and improvement opportunities
Analyzes configuration management and environment settings to identify security risks and improvement opportunities
/plugin marketplace add dgriffith/bad-daves-robot-army/plugin install dgriffith-bad-daves-robot-army@dgriffith/bad-daves-robot-armyUsing @agent-configuration-manager prepare a configuration review report. You must analyze configuration management practices, environment variables, secrets handling, and settings organization in the codebase and create a comprehensive plan WITHOUT making any changes.
The user invoked: /configuration-review {optional_scope}
Valid scopes:
git status and git diff)git log and git diff)gh pr view and gh pr diff)If scope is "current changes":
git status to identify changed filesgit diff to see uncommitted changesIf scope is "recent changes":
git log --oneline -10 to see recent commitsgit diff HEAD~5..HEAD or appropriate rangeIf scope starts with "PR":
gh pr view {number} to get PR detailsgh pr diff {number} to get the changesIf scope is a path:
If no scope provided:
Configuration Security Audit
Environment Management Review
Configuration Organization Assessment
Best Practices Compliance
Create a markdown file at /reports/configuration-review-{timestamp}.md with:
# Configuration Review Plan
Generated: {timestamp}
Scope: {full_path_or_entire_project}
## Executive Summary
Brief overview of configuration management maturity and critical findings
## Configuration Findings
### Critical Issues
- [ ] Security Risk: Description and location
- [ ] Exposed Secret: Description and location
### High Priority Issues
- [ ] Configuration vulnerability: Details
- [ ] Environment management gap: Details
### Medium Priority Issues
- [ ] Best practice violation: Details
- [ ] Improvement opportunity: Details
### Low Priority Issues
- [ ] Minor issue: Details
## Current State Analysis
### Configuration Files Inventory
- List of configuration files found
- Configuration formats used (.env, .json, .yaml, etc.)
- Environment-specific files identified
### Secrets Management Assessment
- How secrets are currently handled
- Storage locations and methods
- Access control mechanisms
- Rotation practices
### Environment Strategy Review
- Environment separation approach
- Variable naming conventions
- Default value strategies
- Validation mechanisms
## Configuration Security Issues
For each critical/high issue:
- Description and risk level
- Potential security impact
- Affected files/components
- Recommended remediation
## Improvement Plan
### Immediate Actions (Critical - Fix Now)
1. Secure exposed secrets
2. Remove hardcoded sensitive values
### Short-term (1-2 weeks)
1. Implement proper secrets management
2. Add configuration validation
3. Separate environment-specific settings
### Long-term Improvements (1+ months)
1. Implement configuration as code
2. Add comprehensive schema validation
3. Implement feature flag system
4. Add configuration monitoring
## Environment Management Recommendations
### Secrets Management
- Recommended tools and practices
- Storage solutions (vault, cloud secrets)
- Access control strategies
- Rotation policies
### Configuration Organization
- File structure recommendations
- Naming conventions
- Schema definition approaches
- Documentation standards
### Validation and Testing
- Startup validation recommendations
- Configuration testing strategies
- Error handling improvements
- Migration testing approaches
## Risk Assessment
- Current configuration security level: Critical/High/Medium/Low
- Environment management maturity: Initial/Developing/Defined/Managed/Optimizing
- Post-improvement target levels
## Implementation Roadmap
### Phase 1: Security (Weeks 1-2)
- Critical security fixes
- Secrets management implementation
### Phase 2: Organization (Weeks 3-4)
- Configuration restructuring
- Validation implementation
### Phase 3: Advanced Features (Months 2-3)
- Feature flags
- Hot reload
- Advanced monitoring
## Compliance Checklist
- [ ] No secrets in code
- [ ] Environment-specific settings separated
- [ ] Configuration validated on startup
- [ ] Feature flags implemented
- [ ] Default values sensible
- [ ] Documentation comprehensive
- [ ] Migration path clear
- [ ] Rollback strategy defined
YOU MUST CREATE THE REPORT FILE. This is not optional.
Create the report file using the Write tool at the specified path:
/reports/{command-name}-{scope}-{timestamp}.mdYYYY-MM-DD-HHmmss/reports/architecture-review-entire-project-2025-10-14-143022.mdFill in ALL sections of the report template
Confirm completion by telling the user:
❌ DON'T: Just summarize findings in the chat ❌ DON'T: Say "I'll create a report" without actually doing it ❌ DON'T: Leave sections incomplete or with placeholders ❌ DON'T: Forget to use the Write tool
✅ DO: Always use the Write tool to create the markdown file ✅ DO: Fill in every section with real findings ✅ DO: Provide the full path to the user when done ✅ DO: Include actionable recommendations
Before responding to the user, verify:
Remember: The report is the primary deliverable. The chat summary is secondary.