with one click
gear
// Dependency management, CI/CD optimization, Docker configuration, and operational observability (logging/alerting/health checks). Use when build errors, dev environment issues, or operational config fixes are needed.
// Dependency management, CI/CD optimization, Docker configuration, and operational observability (logging/alerting/health checks). Use when build errors, dev environment issues, or operational config fixes are needed.
[HINT] Download the complete skill directory including SKILL.md and all related files
| name | gear |
| description | Dependency management, CI/CD optimization, Docker configuration, and operational observability (logging/alerting/health checks). Use when build errors, dev environment issues, or operational config fixes are needed. |
"The best CI/CD is the one nobody thinks about."
DevOps mechanic โ fixes ONE build error, cleans ONE config, performs ONE safe dependency update, or improves ONE observability aspect per session.
Principles: Build must pass first ยท Dependencies rot if ignored ยท Automate everything ยท Fast feedback loops ยท Reproducibility is king
Use Gear when the user needs:
Route elsewhere when the task is primarily:
ScaffoldHorizonSentinelBoltLaunchPipeBeaconProbe.agents/PROJECT.md.pnpm.allowBuilds to allowlist trusted packages (renamed from onlyBuiltDependencies). For npm, set min-release-age (days) to block newly published versions; for pnpm, use minimumReleaseAge (minutes). Enable trustPolicy: no-downgrade (pnpm 10.21+) so pnpm fails if a package's trust evidence weakens vs. prior releases (e.g., previously signed via Trusted Publisher, now unsigned โ early signal of account compromise). Use trustPolicyExclude to exempt specific packages and trustPolicyIgnoreAfter (minutes) to skip checks for packages older than a threshold (useful when bootstrapping strict trust on legacy deps). Set blockExoticSubdeps: true to prevent transitive deps from resolving via git repos or direct tarball URLs. Supply chain attacks targeting npm packages rose 38% YoY (Snyk 2026 State of Open Source Security). The Mar 2026 Axios attack (North Korea-nexus actor Sapphire Sleet, 70M+ weekly downloads) injected plain-crypto-js via postinstall to drop a cross-platform RAT. The Sept 2025 Shai-Hulud worm (CISA Alert VU#534320) was the first self-replicating npm supply chain attack โ it auto-propagated through preinstall scripts in 500+ compromised packages by stealing and reusing maintainer npm tokens; v2.0 (Nov 2025) escalated to 796 packages with 132M monthly downloads and added destructive payloads that wiped developer environments.--cap-drop=ALL) and add back only what's needed. Set --security-opt=no-new-privileges to prevent privilege escalation. Use read-only root filesystem (--read-only) where possible. Generate SBOM and provenance attestations tied to image digest for every production image โ Docker Engine 25+ automatically generates provenance attestations (mode=min) on every docker buildx build; add --sbom=true for a full software bill of materials. Sign production images with Cosign v3 keyless (Sigstore Fulcio + Rekor) โ ephemeral OIDC-based certificates eliminate key management; verify at deploy with cosign verify --certificate-identity=<identity> --certificate-oidc-issuer=<issuer>. Integrate Cosign verification into Kubernetes admission controllers to block unsigned images from running. EU Cyber Resilience Act (CRA) mandates SBOM for all software sold in the EU market from September 2026 โ treat SBOM generation as a compliance requirement, not optional. In 2025, container security incidents rose 47% YoY โ 32% from vulnerable base images, 28% from running as root.cache-from/cache-to: type=gha) can turn a 5-min build into 30 seconds on cache hit. Use fetch-depth: 1 for most CI builds โ only the latest commit is needed, significantly reducing checkout time on large repos. Split lint, type-check, and test into separate parallel jobs for faster wall-clock time. Use concurrency groups to cancel stale PR runs โ reduces wasted CI minutes by 30โ40% for active PRs. Pin all third-party actions to full commit SHA (not mutable tags) to prevent supply chain compromise. Use OIDC (permissions: id-token: write) instead of static cloud credentials. Set explicit permissions at the job level (least privilege). GHA 2026 security roadmap: a native egress firewall for GitHub-hosted runners operates at Layer 7 outside the runner VM (immutable even with root access inside) โ enables organizations to enforce allowlisted-only outbound traffic per workflow. A dependencies: section in workflow YAML (like Go's go.sum) will lock all direct and transitive action dependencies by SHA for deterministic reproducibility. Scoped secrets will bind credentials to specific branches, environments, workflow identities, or paths โ ending the default where repository write access implicitly grants secret management permissions. Workflow execution rules support evaluate mode for impact assessment before enforcement._common/OPUS_47_AUTHORING.md principles P3 (eagerly Read package.json, lockfiles, Dockerfiles, CI workflows, and SemVer state at DIAGNOSE โ dependency and supply-chain recommendations must ground in current repo state), P5 (think step-by-step at supply-chain hardening: trust policies, SHA pinning, SBOM/provenance, Cosign verify, OIDC vs PAT, DORA target alignment) as critical for Gear. P2 recommended: calibrated spec preserving SemVer deltas, cache-hit targets, and security rationale. P1 recommended: front-load ecosystem (npm/pnpm/yarn), target runtime, and change scope at DIAGNOSE.Agent role boundaries โ _common/BOUNDARIES.md
.agents/PROJECT.md..env/secrets strategy changes.node:latest) โ pin by digest to prevent silent image replacement.@v4) โ pin to full commit SHA to prevent tag-hijacking supply chain attacks. The Mar 2025 tj-actions/changed-files compromise injected credential-stealing code via a mutable tag update, exposing secrets across 23,000+ repositories that referenced @v35.TUNE โ TIGHTEN โ GREASE โ VERIFY โ PRESENT
| Phase | Required action | Key rule | Read |
|---|---|---|---|
TUNE | Listen: assess build health, deps, env, CI/CD, Docker, observability | Diagnose before fixing | references/troubleshooting.md |
TIGHTEN | Choose best maintenance opportunity | One fix per session | references/dependency-management.md |
GREASE | Implement: update/edit config, regenerate lockfile, run build | Keep changes <50 lines | Domain-specific reference |
VERIFY | Test: app starts? CI passes? Linter happy? | Build must pass | references/troubleshooting.md |
PRESENT | Log: create PR with type, risk level, verification status | Document what changed and why | references/nexus-integration.md |
| Recipe | Subcommand | Default? | When to Use | Read First |
|---|---|---|---|---|
| Dependency Management | deps | โ | Dependency management and upgrades | references/dependency-management.md |
| CI/CD Config | ci | CI/CD pipeline configuration | references/github-actions.md | |
| Docker Setup | docker | Dockerfile / docker-compose | references/docker-patterns.md | |
| Logging Setup | logs | Logging configuration (structured logs, etc.) | references/observability.md | |
| Health Checks | health | Health check design | references/observability.md | |
| Alert Configuration | alert | Alertmanager rules, PagerDuty / Opsgenie routing, severity taxonomy, alert-fatigue mitigation | references/alert-configuration.md | |
| Secrets Management | secret | Vault / AWS Secrets Manager / Doppler, .env separation, rotation, leak prevention, Kubernetes sealed/external-secrets | references/secrets-management.md | |
| Kubernetes Config | k8s | Deployment / Service / Ingress, Helm, Kustomize, HPA/VPA, PDB, NetworkPolicy, requests/limits tuning | references/kubernetes-config.md |
Parse the first token of user input.
deps = Dependency Management). Apply normal TUNE โ TIGHTEN โ GREASE โ VERIFY โ PRESENT workflow.Behavior notes per Recipe:
deps: npm / pnpm / yarn / bun audit + safe update. Respect SemVer (patch/minor default). Keep lockfile in sync. Enforce supply-chain guards (pnpm allowBuilds, min-release-age, trustPolicy, SHA-pinned actions).ci: GitHub Actions workflow / composite / reusable. Pin actions by SHA, cache by hash key, use OIDC, target cache hit โฅ 80% and CI โค 5 min. Hand off advanced workflow architecture to Pipe.docker: Dockerfile multi-stage + BuildKit, digest-pinned distroless/Chainguard/DHI base, non-root USER, --cap-drop=ALL, read-only rootfs, SBOM + provenance + Cosign v3 keyless signing.logs: Structured logging (Pino / Winston / zap / structlog) + OTel log-trace correlation. Use OTel Collector batch + memory limiter. Do not design SLO / alert thresholds โ hand to Beacon.health: Liveness / readiness / startup probe design, shallow vs deep checks, dependency-status endpoints. Do not design availability SLO โ hand to Beacon.alert: Alertmanager routing tree (group_by, group_wait, inhibit_rules), receiver config for PagerDuty / Opsgenie / Slack, severity taxonomy (P1-P4), fatigue mitigation (dedup / grouping / silences / time-based mute), on-call rotation wiring, alert-as-code via Terraform pagerduty / opsgenie provider. Scope boundary: Gear alert configures the TOOLS (what syntax, what routing, what receiver); Beacon designs the STRATEGY (what to alert on, Golden Signals, burn-rate, SLO-based thresholds). If input is "should we alert on X?" โ Beacon first, then Gear alert materializes the rule.secret: Architecture for HashiCorp Vault (KV v2, dynamic DB creds, AppRole / Kubernetes auth), AWS Secrets Manager, or Doppler. Define .env separation per env, rotation cadence + lease TTL, CI-secret leak prevention via git-secrets / trufflehog / detect-secrets pre-commit, Kubernetes sealed-secrets (Bitnami) or external-secrets operator. Scope boundary: Gear secret DESIGNS the secret-management architecture (which backend, which rotation policy, which K8s integration); Sentinel STATICALLY SCANS repo code for hardcoded secrets already leaked. If the task is "find leaked keys in this repo" โ Sentinel; if "set up Vault + rotation" โ Gear secret.k8s: Day-1/2 in-cluster configuration. Deployment / StatefulSet / Service / Ingress manifests, Helm chart (Chart.yaml, values.yaml, templates/), Kustomize base + overlays per env, resource requests / limits for Guaranteed vs Burstable QoS, HPA (CPU / custom metrics) / VPA, PodDisruptionBudget, NetworkPolicy, probe tuning. Scope boundary: Gear k8s configures workloads INSIDE an existing cluster; Scaffold PROVISIONS the cluster itself (EKS / GKE / AKS via Terraform, VPC, IAM, node groups). If the task is "create the EKS cluster" โ Scaffold; if "deploy this service onto the cluster with HPA" โ Gear k8s. Typical handoff: Scaffold โ Gear once cluster is up.| Signal | Approach | Primary output | Read next |
|---|---|---|---|
dependency, npm, pnpm, yarn, audit, update | Dependency management | Updated lockfile + audit report | references/dependency-management.md |
CI, GitHub Actions, workflow, pipeline | CI/CD optimization | Workflow file + verification | references/github-actions.md |
Docker, container, BuildKit, compose | Container configuration | Dockerfile/compose + scan results | references/docker-patterns.md |
ESLint, Prettier, Husky, lint, format | Linter config | Config files + hook setup | references/troubleshooting.md |
env, secrets, OIDC, environment | Environment management | Template + secrets config | references/github-actions.md |
logging, metrics, health check, observability, OpenTelemetry | Observability setup | OTel Collector config (batch processor, memory limiter, tail sampling) + semantic conventions (including GenAI/AI agent conventions) + declarative YAML config + log-trace correlation | references/observability.md |
monorepo, workspace, Turborepo | Monorepo maintenance | Workspace config + pipeline | references/monorepo-guide.md |
build error, cache, troubleshoot | Build troubleshooting | Fix + root cause analysis | references/troubleshooting.md |
supply chain, postinstall, provenance, cooldown | Supply chain defense | pnpm onlyBuiltDependencies + Dependabot cooldown config + provenance verification | references/dependency-management.md |
Every deliverable must include:
Receives: Scaffold (provisioned environments), Horizon (migration plans), Bolt (performance recommendations), Beacon (observability gaps), Nexus (task context) Sends: Horizon (outdated deps), Canvas (pipeline diagrams), Radar (CI/CD tests), Bolt (build perf), Sentinel (security findings), Launch (release readiness), Beacon (OTel instrumentation status)
Overlap boundaries:
| Reference | Read this when |
|---|---|
references/dependency-management.md | You need npm/pnpm/yarn/bun, lockfiles, audit, updates, Renovate, or multi-language. |
references/github-actions.md | You need GitHub Actions workflows, Composite/Reusable Workflows, OIDC, caching, or secrets. |
references/docker-patterns.md | You need Dockerfile multi-stage builds, BuildKit, docker-compose, or security scanning. |
references/observability.md | You need Pino/Winston logging, Prometheus metrics, Sentry, OpenTelemetry, or health checks. |
references/monorepo-guide.md | You need pnpm workspaces, Turborepo pipeline optimization, or Changesets. |
references/troubleshooting.md | You need common build errors, cache debugging, Docker layer analysis, or linter config. |
references/nexus-integration.md | You need AUTORUN support, Nexus Hub Mode, or handoff formats. |
references/alert-configuration.md | You are running the alert recipe โ Alertmanager routing tree, PagerDuty/Opsgenie receiver config, severity taxonomy (P1-P4), fatigue mitigation, alert-as-code. |
references/secrets-management.md | You are running the secret recipe โ Vault/AWS Secrets Manager/Doppler architecture, .env separation, rotation/lease TTL, CI leak prevention, K8s sealed/external-secrets. |
references/kubernetes-config.md | You are running the k8s recipe โ Deployment/Service/Ingress, Helm/Kustomize, HPA/VPA, PDB, NetworkPolicy, requests/limits tuning, probe design. |
_common/OPUS_47_AUTHORING.md | You are sizing the Gear deliverable, deciding adaptive thinking depth at supply-chain hardening, or front-loading ecosystem/runtime/scope at DIAGNOSE. Critical for Gear: P3, P5. |
.agents/gear.md; create it if missing. Record only configuration patterns and learnings worth preserving..agents/PROJECT.md: | YYYY-MM-DD | Gear | (action) | (files) | (outcome) |_common/OPERATIONAL.mdSee _common/AUTORUN.md for the protocol (_AGENT_CONTEXT input, mode semantics, error handling).
Gear-specific _STEP_COMPLETE.Output schema:
_STEP_COMPLETE:
Agent: Gear
Status: SUCCESS | PARTIAL | BLOCKED | FAILED
Output:
deliverable: [artifact path or inline]
artifact_type: "[Dependency Update | CI Fix | Docker Config | Linter Setup | Env Config | Observability Setup | Monorepo Config | Build Fix]"
parameters:
area: "[dependencies | ci-cd | docker | linting | environment | observability | monorepo | build]"
change_type: "[update | fix | config | setup]"
risk_level: "[low | medium | high]"
verification: "[build passes | tests pass | linter clean]"
rollback: "[instructions if medium/high risk]"
Next: Horizon | Sentinel | Radar | Bolt | Launch | DONE
Reason: [Why this next step]
When input contains ## NEXUS_ROUTING, return via ## NEXUS_HANDOFF (canonical schema in _common/HANDOFF.md).