Help us improve
Share bugs, ideas, or general feedback.
From majestic-devops
Detects IaC tools like Terraform and Ansible, cloud providers including AWS and Cloudflare, recommends skills, and audits security for DevOps infrastructure planning.
npx claudepluginhub majesticlabs-dev/majestic-marketplace --plugin majestic-devopsHow this skill is triggered — by the user, by Claude, or both
Slash command
/majestic-devops:devops-planThis skill is limited to the following tools:
The summary Claude sees in its skill listing — used to decide when to auto-load this skill
Gather infrastructure context for planning. Returns structured findings for the parent plan command.
Use when starting any conversation - establishes mandatory skill invocation for both Development AND Operations workflows
Validates IaC using Terraform, CloudFormation, Pulumi, CDK: runs validation, security policy checks, Infracost cost estimation, and drift detection. Activates on terraform plan or infrastructure review.
Verifies DevOps/infrastructure code like Terraform and Ansible YAML against best practices, security, simplicity, maintainability, and documentation. Scores readiness and generates reports.
Share bugs, ideas, or general feedback.
Gather infrastructure context for planning. Returns structured findings for the parent plan command.
This skill is invoked by /majestic:plan when DevOps keywords are detected in the feature description.
Check for existing infrastructure code:
# Terraform/OpenTofu
ls *.tf infra/*.tf terraform/*.tf infrastructure/*.tf 2>/dev/null
# Ansible
ls ansible.cfg playbook.yml ansible/*.yml playbooks/*.yml 2>/dev/null
ls -d roles/ ansible/roles/ 2>/dev/null
# Cloud-init
ls cloud-init*.yml user-data*.yml cloud-config*.yml 2>/dev/null
Set flags:
HAS_TERRAFORM: true/falseHAS_ANSIBLE: true/falseHAS_CLOUD_INIT: true/falseIf Terraform files exist, extract providers:
grep -h "provider\s*\"" *.tf infra/*.tf 2>/dev/null | grep -oE '"[a-z]+"' | tr -d '"' | sort -u
Common providers to detect:
aws, google, azurerm - Major cloudshcloud - Hetznerdigitalocean - DigitalOceancloudflare - Cloudflarebackblaze - Backblaze B2Based on detection, recommend skills:
| Detection | Skill | Purpose |
|---|---|---|
Any .tf files | majestic-devops:opentofu-coder | HCL patterns, state management |
Provider: hcloud | majestic-devops:hetzner-coder | Hetzner-specific resources |
Provider: cloudflare | majestic-devops:cloudflare-coder | Cloudflare zones, DNS, Workers |
Provider: backblaze | majestic-devops:backblaze-coder | B2 storage patterns |
| Ansible files | majestic-devops:ansible-coder | Playbook patterns |
| Cloud-init files | majestic-devops:cloud-init-coder | VM provisioning |
If existing IaC files found, run security audit:
Apply infra-security-review skill to audit existing infrastructure code for security issues.
Capture findings for the plan.
Return structured context to the calling plan command:
## Infrastructure Context
### Detected Tools
- **Terraform/OpenTofu:** [yes/no] - [version if found]
- **Ansible:** [yes/no]
- **Cloud-init:** [yes/no]
### Providers
[List detected providers]
### Skills to Apply
| Skill | Purpose |
|-------|---------|
| `majestic-devops:opentofu-coder` | [reason] |
| ... | ... |
### Security Findings
[Summary from infra-security-review or "No existing IaC to audit"]
### Recommendations
- [Any specific recommendations based on detection]