From coreweave-pack
Secures CoreWeave Kubernetes deployments using RBAC, network policies, secrets for GPU workloads, model access, and namespace isolation.
npx claudepluginhub jeremylongshore/claude-code-plugins-plus-skills --plugin coreweave-packThis skill is limited to using the following tools:
```bash
Configures kubectl access to CoreWeave Kubernetes clusters using kubeconfig and API tokens, verifies GPU nodes, and deploys test GPU pods.
Provides Kubernetes security best practices for pod security contexts, network policies, RBAC, secrets management, and resource limits. Use when securing K8s deployments.
Guides Kubernetes cluster security with Pod Security Standards, Network Policies, RBAC, admission controllers, and secrets management for hardened, compliant deployments.
Share bugs, ideas, or general feedback.
# HuggingFace token
kubectl create secret generic hf-token --from-literal=token="${HF_TOKEN}"
# Container registry credentials
kubectl create secret docker-registry regcred \
--docker-server=ghcr.io \
--docker-username=$USER \
--docker-password=$TOKEN
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
name: inference-isolation
spec:
podSelector:
matchLabels:
app: inference-server
policyTypes: [Ingress, Egress]
ingress:
- from:
- podSelector:
matchLabels:
role: api-gateway
ports:
- port: 8080
egress:
- to: [] # Allow all egress for model downloads
ports:
- port: 443
For production readiness, see coreweave-prod-checklist.