Redc-useage — cybersecurity Redc-useage, community, cybersecurity, ide skills, infrastructure, multi-cloud, redteam, terraform, Claude Code, Cursor, Windsurf

v1.0.0

Acerca de este Skill

Perfecto para agentes de gestión en la nube que necesitan una gestión de infraestructura de múltiples nubes automatizada con integración de Terraform. Multi-cloud red team infrastructure automation. Deploy and manage cloud resources across AWS, Aliyun, Tencent Cloud with Terraform. Includes commands for init, deploy, manage, execute, and cleanup of infrastructure cases.

# Core Topics

wgpsec wgpsec
[137]
[18]
Updated: 3/19/2026

Killer-Skills Review

Decision support comes first. Repository text comes second.

Reference-Only Page Review Score: 9/11

This page remains useful for operators, but Killer-Skills treats it as reference material instead of a primary organic landing page.

Original recommendation layer Concrete use-case guidance Explicit limitations and caution Quality floor passed for review
Review Score
9/11
Quality Score
67
Canonical Locale
en
Detected Body Locale
en

Perfecto para agentes de gestión en la nube que necesitan una gestión de infraestructura de múltiples nubes automatizada con integración de Terraform. Multi-cloud red team infrastructure automation. Deploy and manage cloud resources across AWS, Aliyun, Tencent Cloud with Terraform. Includes commands for init, deploy, manage, execute, and cleanup of infrastructure cases.

¿Por qué usar esta habilidad?

Habilita a los agentes a automatizar la gestión de infraestructura en múltiples nubes, incluyendo AWS, Aliyun y TencentCloud, utilizando Terraform para una automatización sin problemas y flujos de trabajo eficientes impulsados por inteligencia artificial, al mismo tiempo que se integra con archivos de configuración YAML y gestión de plantillas.

Mejor para

Perfecto para agentes de gestión en la nube que necesitan una gestión de infraestructura de múltiples nubes automatizada con integración de Terraform.

Casos de uso accionables for Redc-useage

Automatizar la implementación de infraestructura en varios proveedores de nube
Generar plantillas de Terraform para una gestión de infraestructura coherente
Depurar problemas de infraestructura de múltiples nubes utilizando las capacidades de automatización de Redc-useage

! Seguridad y limitaciones

  • Requiere la instalación y configuración de Terraform
  • Necesita acceso a las credenciales de los proveedores de nube, como AWS_ACCESS_KEY_ID y ALICLOUD_ACCESS_KEY
  • Limitado a los proveedores de nube compatibles, incluyendo AWS, Aliyun y TencentCloud

Why this page is reference-only

  • - Current locale does not satisfy the locale-governance contract.

Source Boundary

The section below is supporting source material from the upstream repository. Use the Killer-Skills review above as the primary decision layer.

Labs Demo

Browser Sandbox Environment

⚡️ Ready to unleash?

Experience this Agent in a zero-setup browser environment powered by WebContainers. No installation required.

Boot Container Sandbox

FAQ & Installation Steps

These questions and steps mirror the structured data on this page for better search understanding.

? Frequently Asked Questions

What is Redc-useage?

Perfecto para agentes de gestión en la nube que necesitan una gestión de infraestructura de múltiples nubes automatizada con integración de Terraform. Multi-cloud red team infrastructure automation. Deploy and manage cloud resources across AWS, Aliyun, Tencent Cloud with Terraform. Includes commands for init, deploy, manage, execute, and cleanup of infrastructure cases.

How do I install Redc-useage?

Run the command: npx killer-skills add wgpsec/redc/Redc-useage. It works with Cursor, Windsurf, VS Code, Claude Code, and 19+ other IDEs.

What are the use cases for Redc-useage?

Key use cases include: Automatizar la implementación de infraestructura en varios proveedores de nube, Generar plantillas de Terraform para una gestión de infraestructura coherente, Depurar problemas de infraestructura de múltiples nubes utilizando las capacidades de automatización de Redc-useage.

Which IDEs are compatible with Redc-useage?

This skill is compatible with Cursor, Windsurf, VS Code, Trae, Claude Code, OpenClaw, Aider, Codex, OpenCode, Goose, Cline, Roo Code, Kiro, Augment Code, Continue, GitHub Copilot, Sourcegraph Cody, and Amazon Q Developer. Use the Killer-Skills CLI for universal one-command installation.

Are there any limitations for Redc-useage?

Requiere la instalación y configuración de Terraform. Necesita acceso a las credenciales de los proveedores de nube, como AWS_ACCESS_KEY_ID y ALICLOUD_ACCESS_KEY. Limitado a los proveedores de nube compatibles, incluyendo AWS, Aliyun y TencentCloud.

How To Install

  1. 1. Open your terminal

    Open the terminal or command line in your project directory.

  2. 2. Run the install command

    Run: npx killer-skills add wgpsec/redc/Redc-useage. The CLI will automatically detect your IDE or AI agent and configure the skill.

  3. 3. Start using the skill

    The skill is now active. Your AI agent can use Redc-useage immediately in the current project.

! Reference-Only Mode

This page remains useful for installation and reference, but Killer-Skills no longer treats it as a primary indexable landing page. Read the review above before relying on the upstream repository instructions.

Imported Repository Instructions

The section below is supporting source material from the upstream repository. Use the Killer-Skills review above as the primary decision layer.

Supporting Evidence

Redc-useage

Install Redc-useage, an AI agent skill for AI agent workflows and automation. Works with Claude Code, Cursor, and Windsurf with one-command setup.

SKILL.md
Readonly
Imported Repository Instructions
The section below is supporting source material from the upstream repository. Use the Killer-Skills review above as the primary decision layer.
Supporting Evidence

Redc Skills - AI Operations Guide

Multi-cloud red team infrastructure automation tool built on Terraform.

Quick Reference

Config: ~/redc/config.yaml | Templates: ~/redc/redc-templates/ | Docs: https://github.com/wgpsec/redc

Configuration

yaml
1providers: 2 aws: 3 AWS_ACCESS_KEY_ID: "KEY" 4 AWS_SECRET_ACCESS_KEY: "SECRET" 5 region: "us-east-1" 6 aliyun: 7 ALICLOUD_ACCESS_KEY: "KEY" 8 ALICLOUD_SECRET_KEY: "SECRET" 9 region: "cn-hangzhou" 10 tencentcloud: 11 TENCENTCLOUD_SECRET_ID: "ID" 12 TENCENTCLOUD_SECRET_KEY: "KEY" 13 region: "ap-guangzhou"

Env vars: Set AWS_ACCESS_KEY_ID, ALICLOUD_ACCESS_KEY, TENCENTCLOUD_SECRET_ID, etc. if config.yaml unavailable.

Global Flags

FlagDefaultDescription
--config~/redc/config.yamlConfig file path
-u, --usersystemUser identifier
--projectdefaultProject name
--debugfalseDebug mode

Commands

Setup

bash
1redc init # Initialize templates 2redc pull <image> # Download template (e.g., aliyun/ecs) 3redc image ls # List local templates

Deploy

bash
1redc run <template> -n <name> -e key=val # Plan & start (create infrastructure) 2redc plan <template> -n <name> # Plan only (preview without creating) 3redc start <case-id> # Start case (create infrastructure)

Manage

bash
1redc ps # List all cases 2redc status <case-id> # Check status 3redc stop <case-id> # Stop infrastructure 4redc kill <case-id> # Stop & remove 5redc rm <case-id> # Remove case

Execute

bash
1redc exec <case-id> <command> # Run command 2redc exec -t <case-id> bash # Interactive shell 3redc cp <src> <case-id>:<dest> # Upload file 4redc cp <case-id>:<src> <dest> # Download file

Workflows

Quick Deploy:

bash
1redc pull aliyun/ecs && redc init 2redc run aliyun/ecs -n myserver -e password=Pass123 3# Returns case-id (e.g., 8a57078ee856) 4redc exec 8a57078ee856 whoami

Controlled:

bash
1redc plan aws/ec2 -n staging 2# Review the planned resources, then: 3redc start <case-id> 4redc cp deploy.sh <case-id>:/root/ 5redc exec <case-id> "bash /root/deploy.sh"

Cleanup:

bash
1redc stop <case-id> && redc rm <case-id> 2# Or: redc kill <case-id>

Automation

python
1import subprocess, re 2 3def redc_run(template, name, env=None): 4 cmd = ["redc", "run", template, "-n", name] 5 if env: 6 for k, v in env.items(): 7 cmd.extend(["-e", f"{k}={v}"]) 8 result = subprocess.run(cmd, capture_output=True, text=True, check=True) 9 match = re.search(r'[a-f0-9]{12,64}', result.stdout) 10 return match.group(0) if match else None 11 12# Usage 13case_id = redc_run("aliyun/ecs", "auto_deploy", {"password": "Secure123"})

Output Patterns

  • Success: in output
  • Error: in output
  • Case ID: [a-f0-9]{64} (use first 12 chars)
  • Status: running, stopped, created, error

Error Handling

ErrorSolution
Config not foundCreate ~/redc/config.yaml
Template not foundRun redc pull <template>
Case ID not foundCheck redc ps
SSH timeoutVerify instance running, security groups
Init failedCheck network, configure Terraform mirror

JSON Schemas

Case:

json
1{ 2 "id": "string[64]", 3 "name": "string", 4 "template": "string", 5 "status": "running|stopped|created|error", 6 "outputs": {"public_ip": "string"} 7}

Config:

json
1{ 2 "providers": { 3 "aws": {"AWS_ACCESS_KEY_ID": "string", "region": "string"} 4 } 5}

Best Practices

  • Use short IDs (first 12 chars)
  • Assign meaningful names: <project>_<purpose>_<env>
  • Always cleanup: redc stopredc rm
  • Use --debug for troubleshooting
  • Never commit config.yaml to version control
  • Monitor costs with redc ps

Resources

Habilidades relacionadas

Looking for an alternative to Redc-useage or another community skill for your workflow? Explore these related open-source skills.

Ver todo

openclaw-release-maintainer

Logo of openclaw
openclaw

Your own personal AI assistant. Any OS. Any Platform. The lobster way. 🦞

333.8k
0
Inteligencia Artificial

widget-generator

Logo of f
f

Generar complementos de widgets personalizables para el sistema de feeds de prompts.chat

149.6k
0
Inteligencia Artificial

flags

Logo of vercel
vercel

El Marco de React

138.4k
0
Navegador

pr-review

Logo of pytorch
pytorch

Tensores y redes neuronales dinámicas en Python con fuerte aceleración de GPU

98.6k
0
Desarrollador