From aj-geddes-useful-ai-prompts-4
Implements secrets management with HashiCorp Vault, AWS Secrets Manager, or Kubernetes Secrets for secure credential storage, rotation, and auditing.
npx claudepluginhub joshuarweaver/cascade-code-languages-misc-1 --plugin aj-geddes-useful-ai-prompts-4This skill uses the workspace's default tool permissions.
- [Overview](#overview)
Searches, retrieves, and installs Agent Skills from prompts.chat registry using MCP tools like search_skills and get_skill. Activates for finding skills, browsing catalogs, or extending Claude.
Searches prompts.chat for AI prompt templates by keyword or category, retrieves by ID with variable handling, and improves prompts via AI. Use for discovering or enhancing prompts.
Checks Next.js compilation errors using a running Turbopack dev server after code edits. Fixes actionable issues before reporting complete. Replaces `next build`.
Deploy and configure secure secrets management systems to store, rotate, and audit access to sensitive credentials, API keys, and certificates across your infrastructure.
Minimal working example:
# vault-config.hcl
storage "raft" {
path = "/vault/data"
node_id = "node1"
}
listener "tcp" {
address = "0.0.0.0:8200"
tls_cert_file = "/vault/config/vault.crt"
tls_key_file = "/vault/config/vault.key"
}
api_addr = "https://0.0.0.0:8200"
cluster_addr = "https://0.0.0.0:8201"
ui = true
Detailed implementations in the references/ directory:
| Guide | Contents |
|---|---|
| HashiCorp Vault Setup | HashiCorp Vault Setup |
| Vault Kubernetes Integration | Vault Kubernetes Integration |
| Vault Secret Configuration | Vault Secret Configuration |
| AWS Secrets Manager Configuration | AWS Secrets Manager Configuration |
| Kubernetes Secrets | Kubernetes Secrets |