From infrahub
Audits Infrahub repositories against best practices and rules, validating project structure, schemas, objects, Python components, checks, generators, transforms, menus, and .infrahub.yml config. Use for compliance reviews, onboarding, pre-deployment checks.
npx claudepluginhub opsmill/claude-marketplace --plugin infrahubThis skill is limited to using the following tools:
Comprehensive audit of an Infrahub repository against
audit-procedure.mdexamples.mdrules/_sections.mdrules/_template.mdrules/deployment-readiness.mdrules/objects-format.mdrules/practices-schema.mdrules/python-classes.mdrules/registration-completeness.mdrules/schema-display-labels-deprecated.mdrules/schema-naming.mdrules/schema-relationships.mdrules/structure-infrahub-yml.mdrules/xref-query-names.mdCreates Infrahub check definitions with Python validation classes and GraphQL queries for proposed change pipelines. Useful for data quality guards and validation logic.
Audits repository for baseline compliance across 9 categories: configuration, code quality, git hygiene, CI/CD, testing, security, documentation, Clank integration, MCP. Emits Markdown report and JSON sidecar.
Audits repository stack, conventions, assets, tests, docs, risks, and integration points before other skills. Persists reusable markdown summaries to minimize token usage on re-analysis.
Share bugs, ideas, or general feedback.
Comprehensive audit of an Infrahub repository against
all rules and best practices from the infrahub-skills
plugin. Produces a structured report covering schemas,
objects, checks, generators, transforms, menus,
.infrahub.yml configuration, and deployment readiness.
Project structure:
!find . -maxdepth 2 -type f \( -name "*.yml" -o -name "*.yaml" -o -name "*.py" -o -name "*.gql" -o -name "*.j2" \) 2>/dev/null | head -40
Infrahub config:
!cat .infrahub.yml 2>/dev/null || echo "No .infrahub.yml found"
When invoked, the auditor:
.infrahub.yml, schemas, objects, checks,
generators, transforms, menus).infrahub.yml)| Priority | Category | What It Checks |
|---|---|---|
| CRITICAL | Project Structure | .infrahub.yml exists, paths valid |
| CRITICAL | Schema Validation | Naming, relationships, deprecated fields |
| CRITICAL | Object Validation | YAML structure, value types, refs |
| CRITICAL | Python Components | Class inheritance, required methods |
| HIGH | Cross-References | Query names match, target groups |
| HIGH | Relationships | Bidirectional IDs, cardinality |
| HIGH | Registration | All files registered, no orphans |
| MEDIUM | Best Practices | human_friendly_id, display_label |
| MEDIUM | Deployment | Git status, bootstrap placement |
| LOW | Patterns & Style | Code organization, naming |
Tell Claude: "Audit this Infrahub repo" or "Run the Infrahub repo auditor"
The auditor will scan the current working directory and produce a report.
The report is written to AUDIT_REPORT.md in the project root with this structure:
# Infrahub Repository Audit Report
## Summary
- Total findings: N
- Critical: N | High: N | Medium: N | Low: N | Info: N
## Project Structure
...
## Schema Audit
...
## Object Data Audit
...
## Checks Audit
...
## Generators Audit
...
## Transforms Audit
...
## Menus Audit
...
## Cross-Reference Integrity
...
## Deployment Readiness
...
The auditor checks rules from all skills:
.infrahub.yml reference, GraphQLSee rules/ for detailed audit rule definitions.