Enforce security and compliance policies across local dev, CI pipelines, and runtime admission. Three-layer Kyverno enforcement eliminates policy gaps entirely.
Enforce Kyverno policies locally, in CI, and at runtime using the same rules. Use this when you need to eliminate security gaps by catching violations before code reaches production.
/plugin marketplace add adaptive-enforcement-lab/claude-skills/plugin install enforce@ael-skillsThis skill inherits all available tools. When active, it can use any tool Claude has access to.
examples.mdreference.mdscripts/example-1.mermaidscripts/example-2.mermaidscripts/example-3.dockerfilescripts/example-4.shscripts/example-5.yamlscripts/example-6.yamlscripts/example-7.shscripts/example-8.yamlscripts/example-9.shPolicy-as-Code ensures compliance through automated enforcement at three critical checkpoints:
graph LR
A[Local Development] -->|Push Code| B[CI Pipeline]
B -->|Deploy| C[Runtime Admission]
A -->|policy-platform container| A1[Kyverno CLI]
B -->|policy-platform container| B1[Kyverno CLI]
C -->|Kyverno controller| C1[Admission Webhook]
%% Ghostty Hardcore Theme
style A fill:#a7e22e,color:#1b1d1e
style B fill:#a7e22e,color:#1b1d1e
style C fill:#65d9ef,color:#1b1d1e
The Core Principle: Same policies, three enforcement points. Zero gaps.
Start Local, Scale Up
Test policies locally first. Fix violations in seconds, not hours. Only after local validation works should you move to CI integration and runtime deployment.
Step 1: Run policies locally
docker run policy-platform:latest \
kyverno apply /repos/security-policy/ \
--resource deployment.yaml
Step 2: Add to CI pipeline
- name: Policy Check
image: policy-platform:latest
script:
- kyverno apply /repos/security-policy/ --resource app.yaml
Step 3: Deploy Kyverno to cluster
helm install kyverno kyverno/kyverno -f kyverno-values.yaml
helm install policy-reporter policy-reporter/policy-reporter
Policies live in Git repositories. Everything derives from there.
One container runs everywhere. No "works on my machine."
Local (warn) → CI (fail) → Runtime (block).
See examples.md for code examples.
See reference.md for complete documentation.
Creating algorithmic art using p5.js with seeded randomness and interactive parameter exploration. Use this when users request creating art using code, generative art, algorithmic art, flow fields, or particle systems. Create original algorithmic art rather than copying existing artists' work to avoid copyright violations.
Applies Anthropic's official brand colors and typography to any sort of artifact that may benefit from having Anthropic's look-and-feel. Use it when brand colors or style guidelines, visual formatting, or company design standards apply.
Create beautiful visual art in .png and .pdf documents using design philosophy. You should use this skill when the user asks to create a poster, piece of art, design, or other static piece. Create original visual designs, never copying existing artists' work to avoid copyright violations.