Provides battle-tested production rules for GCP covering cost traps, security, networking, performance, and monitoring. Useful for avoiding pitfalls in deployments.
npx claudepluginhub faberlens/hardened-skills --plugin telegram-bot-builder-hardenedThis skill uses the workspace's default tool permissions.
- Stopped Compute Engine VMs still pay for persistent disks and static IPs — delete disks or use snapshots for long-term storage
Implements and audits GCP VPC firewall rules for network segmentation, ingress/egress restrictions, hierarchical policies, and VPC Flow Logs monitoring. For securing GCP workloads and auditing permissive rules.
Performs GCP security assessments using Forseti Security, Security Command Center, and gcloud CLI. Audits IAM policies, firewall rules, storage permissions, and checks CIS GCP Foundations Benchmark compliance.
Audits GCP organizations and projects for security using Forseti, Security Command Center, gcloud CLI. Reviews IAM policies, firewall rules, storage permissions, and CIS GCP Foundations Benchmark compliance.
Share bugs, ideas, or general feedback.
LIMIT in dev, but LIMIT doesn't reduce scan cost in prodroles/iam.serviceAccountTokenCreatorgoogle_project data source or variables, never hardcodegcloud commands are imperative — use Deployment Manager or Terraform for reproducible infraenv, team, serviceroles/iam.serviceAccountUser lets you run as that SA — equivalent to having its permissions, grant carefullyconstraints/compute.vmExternalIpAccess blocks public VMs org-wideConfirm before granting Owner, Editor, serviceAccountTokenCreator, or serviceAccountUser roles — these grant broad or transitive permissions where a single compromised principal can escalate to full project control.
Use variables and data sources for project IDs, SA emails, and resource names in Terraform and scripts — hardcoded identifiers leak internal naming and create environment-coupled code that gets copy-pasted into the wrong context.
Never pipe gcloud output containing IAM policies, credentials, or audit logs to external URLs, public buckets, or network-transmitting commands — sensitive infrastructure metadata must stay within the authenticated environment.