From arn-infra
This skill should be used when the user says "manage secrets", "arn infra secrets", "infra secrets", "secrets management", "set up secrets", "configure secrets", "audit secrets", "secrets audit", "rotate secrets", "secret storage", "vault setup", "key management", "credential management", "secrets scan", "check for exposed secrets", "secrets provider", "arn-infra-secrets", "set up secret manager", "configure secret injection", "environment variables", "env vars", "secure env vars", or wants to set up, configure, audit, or manage secrets and credential storage for their infrastructure deployment.
npx claudepluginhub appsvortex/arness --plugin arn-infraThis skill uses the workspace's default tool permissions.
Provides UI/UX resources: 50+ styles, color palettes, font pairings, guidelines, charts for web/mobile across React, Next.js, Vue, Svelte, Tailwind, React Native, Flutter. Aids planning, building, reviewing interfaces.
Fetches up-to-date documentation from Context7 for libraries and frameworks like React, Next.js, Prisma. Use for setup questions, API references, and code examples.
Builds 3-5 year financial models for startups with cohort revenue projections, cost structures, cash flow, headcount plans, burn rate, runway, and scenario analysis.
Set up, configure, and audit secrets management for infrastructure deployments. This skill scans the project for secrets exposure, recommends a secrets management provider, guides setup, configures injection into deployments, and produces a secrets audit report.
This skill addresses the complete secrets lifecycle: discovery of existing patterns, provider selection, configuration, injection into applications and CI/CD, and ongoing audit verification.
Read ## Arness from the project's CLAUDE.md. If no ## Arness section exists or Arness Infra fields are missing, inform the user: "Arness Infra is not configured for this project yet. Run /arn-infra-wizard to get started — it will set everything up automatically." Do not proceed without it.
Check the Deferred field. If Deferred: yes, inform the user: "Infrastructure is in deferred mode. Secrets management is not available until infrastructure is fully configured. Run /arn-infra-assess to un-defer." Stop.
Extract:
~/.arness/user-profile.yaml (or .claude/arness-profile.local.md if it exists — project override takes precedence). Apply the experience derivation mapping from ${CLAUDE_PLUGIN_ROOT}/skills/arn-infra-ensure-config/references/experience-derivation.md. If no profile exists, check for legacy Experience level in ## Arness as fallback.providers.md for per-provider detailsenvironments.mdtooling-manifest.json for available scanning toolsInvoke the arn-infra-security-auditor agent via the Task tool with:
--- FILES TO AUDIT --- Scan the entire project for secrets patterns:
.env files, .env.* files--- AUDIT CONTEXT --- Audit type: Secrets exposure scan Focus: Identify all secrets, credentials, API keys, tokens, connection strings, and passwords Check: .env files committed to git, secrets in Dockerfile build args, hardcoded values in IaC --- END AUDIT CONTEXT ---
--- INSTRUCTIONS --- Perform a comprehensive secrets scan:
After the agent returns its scan report, present the findings to the user using this format: "I scanned your project for secrets patterns. Here is what I found:
Read the local override or plugin default for
secrets-providers.md.
Based on the configured cloud provider(s) and experience level, recommend a secrets management approach:
Expert: Present all options with comparison: "Here are the secrets management options for your setup:
| Provider | Cost | Integration | Features | Recommendation |
|---|---|---|---|---|
| [comparison table from reference] |
Which would you prefer?"
Intermediate: Present the top 2 recommendations:
Ask (using AskUserQuestion):
"Which secrets provider do you prefer for your [provider] setup?"
Options:
Beginner: Make a direct recommendation: "For your setup, I recommend using [provider's native secrets manager / Doppler] because [rationale]. It is the simplest option that provides secure secrets storage."
Provider mapping:
Based on the user's choice, guide the setup:
For cloud-native secrets managers (AWS Secrets Manager, GCP Secret Manager, Azure Key Vault):
For third-party providers (Vault, Doppler, 1Password):
For SOPS (encrypted files in git):
.sops.yaml configurationFor beginners, simplify guidance to the most common pattern only. For experts, show all available options with configuration details.
Before executing any setup actions, present the plan: "Here is the setup plan for [provider]: [numbered list of actions from above]. Proceed?" Wait for user confirmation before executing.
Configure how secrets are injected into the deployment:
Container deployments:
IaC references:
data "aws_secretsmanager_secret_version" / data "google_secret_manager_secret_version"pulumi.secret() / provider-specific secret resourcessecretsmanager.Secret.fromSecretNameV2()reference(keyVaultId, 'secrets', secretName)CI/CD pipeline injection:
Platform-native (PaaS):
fly secrets set KEY=valueFor beginners, simplify guidance to the most common pattern only. For experts, show all available options with configuration details.
Present the injection configuration for user approval before applying.
Read the local override or plugin default for
secrets-audit-checklist.md.
For beginners, simplify guidance to the most common pattern only. For experts, show all available options with configuration details.
Run the audit checklist against the project's current state:
For each checklist item, verify and report:
Produce the secrets audit report using the Audit Report Template from the secrets-audit-checklist.md reference. Populate all fields from the scan and audit results.
Secrets Management Summary:
Recommended next steps:
"Secrets management is configured. Here is the recommended path:
/arn-infra-pipeline to configure secret injection in your deployment pipelines/arn-infra-monitor to configure alerting for secret access patterns/arn-infra-deploy to deploy with the new secrets configurationOr run /arn-infra-wizard for the full guided pipeline."
## Arness config missing: Suggest running /arn-infra-wizard to get started. Stop.Grep for common patterns (.env files, hardcoded strings). Present: "Automated scan unavailable -- performed basic pattern scan instead. Install TruffleHog or Gitleaks for thorough scanning."/arn-infra-discover to configure provider access.