Help us improve
Share bugs, ideas, or general feedback.
From infrastructure-drift-detector
Detects drift between cloud infrastructure and IaC using terraform plan, CloudFormation detect-stack-drift, or Pulumi preview. Parses changes, generates resource-level reports, and suggests remediation.
npx claudepluginhub jeremylongshore/claude-code-plugins-plus-skills --plugin infrastructure-drift-detectorHow this skill is triggered — by the user, by Claude, or both
Slash command
/infrastructure-drift-detector:detecting-infrastructure-driftThis skill is limited to the following tools:
The summary Claude sees in its skill listing — used to decide when to auto-load this skill
!`ls *.tf Dockerfile docker-compose.yml 2>/dev/null || echo 'No IaC files found'`
Analyzes Terraform, CloudFormation, and Pulumi IaC for module structure, state management, drift prevention, and security posture. Use when reviewing configs, auditing modules, or PRs adding cloud resources.
Validates IaC using Terraform, CloudFormation, Pulumi, CDK: runs validation, security policy checks, Infracost cost estimation, and drift detection. Activates on terraform plan or infrastructure review.
Use when detecting infrastructure drift between Terraform state and actual AWS resources. Identifies out-of-band changes.
Share bugs, ideas, or general feedback.
!ls *.tf Dockerfile docker-compose.yml 2>/dev/null || echo 'No IaC files found'
!terraform version 2>/dev/null || echo 'Terraform not installed'
Detect discrepancies between actual cloud infrastructure state and the desired state defined in IaC (Terraform, CloudFormation, Pulumi). Run drift detection commands, analyze modified/added/deleted resources, generate drift reports with affected resources, and provide remediation steps to bring infrastructure back into compliance.
.tf files, template.yaml, or Pulumi.yamlterraform init to download providers and configure backendterraform plan -detailed-exitcode (exit code 2 = drift detected), aws cloudformation detect-stack-drift, or pulumi previewterraform apply to enforce desired state, terraform import to adopt changes, or update IaC to match realityterraform apply, terraform import, or IaC code updates| Error | Cause | Solution |
|---|---|---|
Error acquiring state lock | Another Terraform process is running or stale lock | Wait for the other process; use terraform force-unlock <ID> if the lock is stale |
Unable to authenticate to cloud provider | Expired or missing credentials | Refresh with aws configure, gcloud auth login, or az login |
No state file found | Backend not initialized or state file deleted | Run terraform init to configure the backend; restore state from backup if deleted |
Access denied reading resource | IAM policy missing read permissions for some resource types | Grant read-only access for all resource types managed by IaC (ReadOnlyAccess or specific policies) |
State file version mismatch | Terraform version newer than state format | Upgrade Terraform to match the state version or use terraform state replace-provider |
terraform plan and posts drift results to Slack if any resources are out of sync."