From jeremylongshore-claude-code-plugins-plus-skills
Analyzes Kubernetes RBAC permissions, roles, and bindings for security audits, compliance, and threat modeling. Generates configurations and best practices.
npx claudepluginhub jeremylongshore/claude-code-plugins-plus-skills --plugin langchain-py-packThis skill is limited to using the following tools:
This skill provides automated assistance for kubernetes rbac analyzer tasks within the Security Advanced domain.
Audits Kubernetes RBAC configurations for overly permissive roles, wildcard permissions, dangerous ClusterRoleBindings, service account abuse, and privilege escalation using kubectl, rbac-tool, KubiScan, Kubeaudit.
Audits Kubernetes cluster RBAC using kubectl, rbac-tool, KubiScan, Kubeaudit to identify permissive roles, wildcard permissions, dangerous bindings, service account abuse, and escalation paths.
Audits Kubernetes RBAC configurations for overly permissive roles, wildcard permissions, dangerous bindings, service account abuse, and privilege escalation using kubectl, rbac-tool, KubiScan, Kubeaudit. For cluster security assessments on EKS, GKE, AKS.
Share bugs, ideas, or general feedback.
This skill provides automated assistance for kubernetes rbac analyzer tasks within the Security Advanced domain.
This skill activates automatically when you:
Example: Basic Usage Request: "Help me with kubernetes rbac analyzer" Result: Provides step-by-step guidance and generates appropriate configurations
| Error | Cause | Solution |
|---|---|---|
| Configuration invalid | Missing required fields | Check documentation for required parameters |
| Tool not found | Dependency not installed | Install required tools per prerequisites |
| Permission denied | Insufficient access | Verify credentials and permissions |
Part of the Security Advanced skill category. Tags: pentesting, compliance, soc2, gdpr, threat-modeling