Manage environment configurations and secrets across dev/staging/prod deployments using .env files, Kubernetes ConfigMaps/Secrets, and AWS SSM. Audit values, encrypt secrets with sops, validate schemas, detect drift, and run promotion workflows. Generate secure, scalable DevOps setup code for Docker, Kubernetes, Terraform, AWS, and GCP infrastructure.
npx claudepluginhub jeremylongshore/claude-code-plugins-plus-skills --plugin environment-config-managerShare bugs, ideas, or general feedback.
Integrate with secrets managers (Vault, AWS Secrets Manager, etc)
DevsForge Enterprise Environment Configuration Manager delivering comprehensive secrets management, configuration validation excellence, and multi-environment orchestration that transforms environment configuration from scattered files into centralized, secure, and intelligent configuration systems with enterprise-grade security
Infrastructure and cloud operations: Kubernetes, Terraform, Helm, GitHub Actions, AWS, GCP
Set of DevOps skills for Claude Code.
Deployment engineering with Terraform and infrastructure as code
Editorial "DevOps & Cloud" bundle for Claude Code from Antigravity Awesome Skills.
416 plugins, 2,574 skills, 154 agents, 16 community contributors — validated and ready to install.
pnpm add -g @intentsolutionsio/ccpi # Install the CLI
ccpi install devops-automation-pack # Install any plugin
Or use Claude's built-in command:
/plugin marketplace add jeremylongshore/claude-code-plugins
Browse the marketplace | Explore plugins | Download bundles
Killer Skill of the Week — token-optimizer by Alex Greenshpun (@alexgreensh)
Ghost tokens eat your context. Find them. Fix them. Prevent rot.
Claude gets measurably dumber as your context fills. Compaction destroys 60-70% of your conversation. Ghost tokens burn through your rate limits on every message. Token Optimizer tracks all of it: live quality scoring on your status line, smart compaction that saves your decisions before they're lost, full analytics dashboard with per-session cost breakdowns, and 6 parallel audit agents that optimize your entire setup. Not a one-time scan. An ongoing intelligence layer for your Claude Code workflow.
"My Claude Code kept leaking tokens. So I built this. Now my limits last longer, context stays fresh, and I have full visibility and control over my usage & setup." — Alex Greenshpun
Grade: A | Week of March 23, 2026 | Install from GitHub
Previous picks: executive-assistant-skills, skill-creator, cursor-pack, crypto-portfolio-tracker. See all at tonsofskills.com.
Option 1: CLI (Recommended)
pnpm add -g @intentsolutionsio/ccpi
ccpi search devops # Find plugins by keyword
ccpi install devops-automation-pack
ccpi list --installed # See what's installed
ccpi update # Pull latest versions
Option 2: Claude Built-in Commands
/plugin marketplace add jeremylongshore/claude-code-plugins
/plugin install devops-automation-pack@claude-code-plugins-plus
Already using an older install? Run
/plugin marketplace remove claude-code-pluginsand re-add with the command above to switch to the new slug.
Browse the catalog: Visit tonsofskills.com or explore plugins/
Agent Skills are instruction files (SKILL.md) that teach Claude Code when and how to perform specific tasks. Unlike commands that require explicit /slash triggers, skills activate automatically when Claude detects relevant conversation context.
1. INSTALL /plugin install ansible-playbook-creator@claude-code-plugins-plus
2. STARTUP Claude reads SKILL.md frontmatter → learns trigger phrases
3. ACTIVATE You say "create an ansible playbook for Apache"
4. EXECUTE Claude matches trigger → reads full skill → follows instructions
---
name: ansible-playbook-creator
description: |
Generate production-ready Ansible playbooks. Use when automating server
configuration or deployments. Trigger with "ansible playbook" or
"create playbook for [task]".
allowed-tools: Read, Write, Bash(ansible:*), Glob
version: 2.0.0
author: Jeremy Longshore <jeremy@intentsolutions.io>
license: MIT
---
# Ansible Playbook Creator
## Overview
Generates idempotent Ansible playbooks following infrastructure-as-code best practices.
## Instructions
1. Gather target host details and desired state
2. Select appropriate Ansible modules
3. Generate playbook with proper variable templating
4. Validate syntax with `ansible-lint`
## Output
- Complete playbook YAML ready for `ansible-playbook` execution