Ship Gate
Skill Verified ActivePre-production audit that scans a codebase for security, database, deployment, code quality, AI/LLM, dependency, frontend, and observability issues. Intercepts deploy commands and blocks until critical items pass. Stack-agnostic. Use for "run ship gate", "am I ready to ship", "pre-launch audit", "can I deploy", "push to production", "go live checklist", "preflight check". Not for CI/CD setup or infra provisioning.
To ensure code quality and production readiness by automating pre-deployment checks, preventing critical issues from reaching production.
Features
- Automated pre-production security audit
- Code quality and dependency scanning
- Stack detection for relevant checks
- Intercepts deploy commands to enforce quality gates
- Categorized findings with remediation guidance
Use Cases
- Use when "pushing to production" to ensure readiness.
- Use for "pre-launch audits" to catch critical issues.
- Use as a "go live checklist" before any major release.
- Use for "can I deploy" verification.
Non-Goals
- Setting up CI/CD pipelines.
- Provisioning infrastructure.
- Configuring monitoring tools.
- Running analysis after deployment.
Workflow
- Detect project stack (framework, DB, deploy target, auth, AI).
- Run automated checks across categories (SEC, DB, CODE, DEP, AI, DEPLOY, FE, OBS).
- Present findings categorized by severity (CRITICAL, HIGH, ADVISORY).
- Prompt user for manual confirmation on non-automatable checks.
- Provide a final verdict (DO NOT SHIP, SHIP WITH CAUTION, CLEAR TO SHIP).
Practices
- Security Auditing
- Code Quality
- Deployment Readiness
- DevOps Practices
Prerequisites
- Python 3 installed
- Access to the codebase to be scanned
Installation
First, add the marketplace
/plugin marketplace add alirezarezvani/claude-skills/plugin install engineering@claude-code-skillsQuality Score
VerifiedTrust Signals
Similar Extensions
Semgrep Rule Creator
100Creates custom Semgrep rules for detecting security vulnerabilities, bug patterns, and code patterns. Use when writing Semgrep rules or building custom static analysis detections.
Safe Mode
100Prevent destructive operations using Claude Code hooks. Three modes — cautious (warn on dangerous commands), lockdown (restrict edits to one directory), and clear (remove restrictions). Uses PreToolUse matchers for Bash, Edit, and Write.
Fixflow
100Execute coding tasks with a strict delivery workflow: build a full plan, implement one step at a time, run tests continuously, and commit by default after each step (`per_step`). Support explicit commit policy overrides (`final_only`, `milestone`) and optional BDD (Given/When/Then) when users ask for behavior-driven delivery or requirements are unclear.
Wrangler
100Cloudflare Workers CLI for deploying, developing, and managing Workers, KV, R2, D1, Vectorize, Hyperdrive, Workers AI, Containers, Queues, Workflows, Pipelines, and Secrets Store. Load before running wrangler commands to ensure correct syntax and best practices. Biases towards retrieval from Cloudflare docs over pre-trained knowledge.
Devops
100Deploy to Cloudflare (Workers, R2, D1), Docker, GCP (Cloud Run, GKE), Kubernetes (kubectl, Helm). Use for serverless, containers, CI/CD, GitOps, security audit.
Launch Runbook
99Plan and execute a launch runbook covering pre-launch verification, go-live procedures, DNS cutover, post-launch monitoring, and rollback procedures. Use this skill whenever the user is preparing to launch a website or product, planning a DNS cutover, building a go-live checklist, or executing a launch day. Triggers on launch runbook, go-live, launch day, DNS cutover, deploy to production, site launch, product launch, cutover plan, launch checklist, deployment procedure. Also triggers when a launch is approaching and the team needs structured coordination, even if 'runbook' is not explicitly stated.