From magic-powers
Use when configuring GCP IAM roles, service accounts, org policies, Workload Identity Federation, or least-privilege access. Covers GCP Security Engineer domain: Configuring access (~22-28%) and DevOps domain: Org management (~20%).
npx claudepluginhub kienbui1995/magic-powers --plugin magic-powersThis skill uses the workspace's default tool permissions.
- Designing access control for GCP resources
Generates design tokens/docs from CSS/Tailwind/styled-components codebases, audits visual consistency across 10 dimensions, detects AI slop in UI.
Records polished WebM UI demo videos of web apps using Playwright with cursor overlay, natural pacing, and three-phase scripting. Activates for demo, walkthrough, screen recording, or tutorial requests.
Delivers idiomatic Kotlin patterns for null safety, immutability, sealed classes, coroutines, Flows, extensions, DSL builders, and Gradle DSL. Use when writing, reviewing, refactoring, or designing Kotlin code.
| Type | Description | Example |
|---|---|---|
| Basic | Project-wide: Owner, Editor, Viewer | roles/editor |
| Predefined | Service-specific, fine-grained | roles/bigquery.dataViewer |
| Custom | User-defined combination of permissions | custom/myRole |
constraints/compute.requireShieldedVm, constraints/iam.disableServiceAccountKeyCreationrequest.time < timestamp, resource.name.startsWith("projects/prod")bigquery.tables.get)roles/owner or roles/editor on service accounts, service account keys committed to codeallUsers / allAuthenticatedUsers = public access; audit carefully