Ship Gate
Skill Verifiziert AktivPre-production audit that scans a codebase for security, database, deployment, code quality, AI/LLM, dependency, frontend, and observability issues. Intercepts deploy commands and blocks until critical items pass. Stack-agnostic. Use for "run ship gate", "am I ready to ship", "pre-launch audit", "can I deploy", "push to production", "go live checklist", "preflight check". Not for CI/CD setup or infra provisioning.
To ensure code quality and production readiness by automating pre-deployment checks, preventing critical issues from reaching production.
Funktionen
- Automated pre-production security audit
- Code quality and dependency scanning
- Stack detection for relevant checks
- Intercepts deploy commands to enforce quality gates
- Categorized findings with remediation guidance
Anwendungsfälle
- Use when "pushing to production" to ensure readiness.
- Use for "pre-launch audits" to catch critical issues.
- Use as a "go live checklist" before any major release.
- Use for "can I deploy" verification.
Nicht-Ziele
- Setting up CI/CD pipelines.
- Provisioning infrastructure.
- Configuring monitoring tools.
- Running analysis after deployment.
Workflow
- Detect project stack (framework, DB, deploy target, auth, AI).
- Run automated checks across categories (SEC, DB, CODE, DEP, AI, DEPLOY, FE, OBS).
- Present findings categorized by severity (CRITICAL, HIGH, ADVISORY).
- Prompt user for manual confirmation on non-automatable checks.
- Provide a final verdict (DO NOT SHIP, SHIP WITH CAUTION, CLEAR TO SHIP).
Praktiken
- Security Auditing
- Code Quality
- Deployment Readiness
- DevOps Practices
Voraussetzungen
- Python 3 installed
- Access to the codebase to be scanned
Installation
Zuerst Marketplace hinzufügen
/plugin marketplace add alirezarezvani/claude-skills/plugin install engineering@claude-code-skillsQualitätspunktzahl
VerifiziertVertrauenssignale
Ähnliche Erweiterungen
Semgrep Rule Creator
100Creates custom Semgrep rules for detecting security vulnerabilities, bug patterns, and code patterns. Use when writing Semgrep rules or building custom static analysis detections.
Safe Mode
100Prevent destructive operations using Claude Code hooks. Three modes — cautious (warn on dangerous commands), lockdown (restrict edits to one directory), and clear (remove restrictions). Uses PreToolUse matchers for Bash, Edit, and Write.
Fixflow
100Führen Sie Codierungsaufgaben mit einem strengen Liefer-Workflow aus: Erstellen Sie einen vollständigen Plan, implementieren Sie Schritt für Schritt, führen Sie kontinuierlich Tests durch und committen Sie standardmäßig nach jedem Schritt (`per_step`). Unterstützt explizite Commit-Policy-Überschreibungen (`final_only`, `milestone`) und optional BDD (Given/When/Then), wenn Benutzer verhaltensgesteuerte Bereitstellung anfordern oder Anforderungen unklar sind.
Wrangler
100Cloudflare Workers CLI zum Bereitstellen, Entwickeln und Verwalten von Workers, KV, R2, D1, Vectorize, Hyperdrive, Workers AI, Containern, Queues, Workflows, Pipelines und Secrets Store. Laden Sie dies, bevor Sie `wrangler`-Befehle ausführen, um die korrekte Syntax und die besten Vorgehensweisen sicherzustellen. Bevorzugt die Abfrage von Cloudflare-Dokumenten gegenüber vortrainiertem Wissen.
Devops
100Deploy to Cloudflare (Workers, R2, D1), Docker, GCP (Cloud Run, GKE), Kubernetes (kubectl, Helm). Use for serverless, containers, CI/CD, GitOps, security audit.
Launch Runbook
99Plan and execute a launch runbook covering pre-launch verification, go-live procedures, DNS cutover, post-launch monitoring, and rollback procedures. Use this skill whenever the user is preparing to launch a website or product, planning a DNS cutover, building a go-live checklist, or executing a launch day. Triggers on launch runbook, go-live, launch day, DNS cutover, deploy to production, site launch, product launch, cutover plan, launch checklist, deployment procedure. Also triggers when a launch is approaching and the team needs structured coordination, even if 'runbook' is not explicitly stated.