spec — spécifications de plateforme cloud cloud-native-ref, community, spécifications de plateforme cloud, ide skills, compositions Crossplane, modifications d'infrastructure, sécurité de la plateforme cloud, CLI de spécifications, outils de spécification de plateforme cloud

v1.0.0

À propos de ce Skill

Parfait pour les Agents Cloud Natifs nécessitant des spécifications de conception préalables pour Kubernetes et les flux de travail DevOps. Spec est un outil de spécification de plateforme cloud qui permet de créer des descriptions légères pour les modifications

Fonctionnalités

Création de spécifications légères pour les modifications de la plateforme cloud
Prise en charge des compositions Crossplane
Prise en charge des modifications d'infrastructure
Types de spécifications : composition, infrastructure, sécurité et plateforme
Utilisation de commandes CLI pour créer et gérer des spécifications

# Core Topics

Smana Smana
[90]
[15]
Updated: 3/6/2026

Killer-Skills Review

Decision support comes first. Repository text comes second.

Reference-Only Page Review Score: 10/11

This page remains useful for teams, but Killer-Skills treats it as reference material instead of a primary organic landing page.

Original recommendation layer Concrete use-case guidance Explicit limitations and caution Quality floor passed for review
Review Score
10/11
Quality Score
56
Canonical Locale
en
Detected Body Locale
en

Parfait pour les Agents Cloud Natifs nécessitant des spécifications de conception préalables pour Kubernetes et les flux de travail DevOps. Spec est un outil de spécification de plateforme cloud qui permet de créer des descriptions légères pour les modifications

Pourquoi utiliser cette compétence

Permet aux agents de créer des spécifications légères pour les modifications des plateformes cloud natives, en bénéficiant d'une conception préalable utilisant la composition, l'infrastructure, la sécurité et les types de plateforme, et en exploitant les compositions Kubernetes et Crossplane.

Meilleur pour

Parfait pour les Agents Cloud Natifs nécessitant des spécifications de conception préalables pour Kubernetes et les flux de travail DevOps.

Cas d'utilisation exploitables for spec

Automatiser de nouveaux conceptions de composition Crossplane
Générer des spécifications de modifications d'infrastructure pour VPC, EKS et IAM
Déboguer les modifications de sécurité en utilisant les politiques de réseau, RBAC et PKI

! Sécurité et Limitations

  • Nécessite une inférence de description ou de type pour la création de spécifications
  • Limité aux plateformes cloud natives et aux flux de travail Kubernetes

Why this page is reference-only

  • - Current locale does not satisfy the locale-governance contract.

Source Boundary

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

Curated Collection Review

Reviewed In Curated Collections

This section shows how Killer-Skills includes, reviews, and maintains this skill inside curated collections, so you can see where it fits in practical selection paths instead of relying only on the upstream README.

After The Review

Decide The Next Action Before You Keep Reading Repository Material

Killer-Skills should not stop at opening repository instructions. It should help you decide whether to install this skill, when to cross-check against trusted collections, and when to move into workflow rollout.

Labs Demo

Browser Sandbox Environment

⚡️ Ready to unleash?

Experience this Agent in a zero-setup browser environment powered by WebContainers. No installation required.

Boot Container Sandbox

FAQ & Installation Steps

These questions and steps mirror the structured data on this page for better search understanding.

? Frequently Asked Questions

What is spec?

Parfait pour les Agents Cloud Natifs nécessitant des spécifications de conception préalables pour Kubernetes et les flux de travail DevOps. Spec est un outil de spécification de plateforme cloud qui permet de créer des descriptions légères pour les modifications

How do I install spec?

Run the command: npx killer-skills add Smana/cloud-native-ref. It works with Cursor, Windsurf, VS Code, Claude Code, and 19+ other IDEs.

What are the use cases for spec?

Key use cases include: Automatiser de nouveaux conceptions de composition Crossplane, Générer des spécifications de modifications d'infrastructure pour VPC, EKS et IAM, Déboguer les modifications de sécurité en utilisant les politiques de réseau, RBAC et PKI.

Which IDEs are compatible with spec?

This skill is compatible with Cursor, Windsurf, VS Code, Trae, Claude Code, OpenClaw, Aider, Codex, OpenCode, Goose, Cline, Roo Code, Kiro, Augment Code, Continue, GitHub Copilot, Sourcegraph Cody, and Amazon Q Developer. Use the Killer-Skills CLI for universal one-command installation.

Are there any limitations for spec?

Nécessite une inférence de description ou de type pour la création de spécifications. Limité aux plateformes cloud natives et aux flux de travail Kubernetes.

How To Install

  1. 1. Open your terminal

    Open the terminal or command line in your project directory.

  2. 2. Run the install command

    Run: npx killer-skills add Smana/cloud-native-ref. The CLI will automatically detect your IDE or AI agent and configure the skill.

  3. 3. Start using the skill

    The skill is now active. Your AI agent can use spec immediately in the current project.

! Reference-Only Mode

This page remains useful for installation and reference, but Killer-Skills no longer treats it as a primary indexable landing page. Read the review above before relying on the upstream repository instructions.

Upstream Repository Material

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

Upstream Source

spec

Install spec, an AI agent skill for AI agent workflows and automation. Review the use cases, limitations, and setup path before rollout.

SKILL.md
Readonly
Upstream Repository Material
The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.
Supporting Evidence

Spec Skill

Create lightweight specifications for changes that benefit from upfront design.

Usage

/spec "description"
/spec composition "Add Valkey caching"
/spec infrastructure "Add GPU node pool"

Types (optional): composition | infrastructure | security | platform

If type is omitted, infer from description or ask.

When to Use

  • New Crossplane compositions
  • Major infrastructure changes (VPC, EKS, IAM)
  • Security changes (network policies, RBAC, PKI)
  • Multi-component platform features

When NOT to Use

  • Version bumps, documentation-only, single-file bug fixes, minor config tweaks

Workflow

1. Generate Identifiers

bash
1# Next spec number (3 digits) 2MAX_NUM=$(find docs/specs -name "spec.md" -path "*/[0-9]*" 2>/dev/null | \ 3 sed 's|.*/\([0-9]*\)-.*|\1|' | sort -rn | head -1) 4SPEC_NUM=$(printf "%03d" $((10#${MAX_NUM:-0} + 1))) 5 6# Slug from description (3-4 meaningful words, kebab-case) 7# Filter stop words, take meaningful words, join with hyphens

2. Create GitHub Issue

bash
1ISSUE_URL=$(gh issue create \ 2 --title "[SPEC] ${TITLE}" \ 3 --label "spec,spec:draft" \ 4 --body "## Summary 5${DESCRIPTION} 6 7## Spec Directory 8\`docs/specs/${SPEC_NUM}-${SLUG}/\` 9 10--- 11_Lightweight spec. See spec file for details._") 12 13ISSUE_NUM=$(echo "$ISSUE_URL" | grep -oP 'issues/\K\d+$')

Labels used:

  • spec - All specification issues
  • spec:draft - Initial state (add manually: spec:implementing when work starts, spec:done when archived)

3. Create Spec Directory and File

bash
1SPEC_DIR="docs/specs/${SPEC_NUM}-${SLUG}" 2mkdir -p "$SPEC_DIR"

Copy template from docs/specs/templates/spec.md and fill:

  • SPEC-XXXSPEC-${SPEC_NUM}
  • #XXX#${ISSUE_NUM}
  • YYYY-MM-DD → current date
  • [Title] → from description
bash
1gh issue comment ${ISSUE_NUM} --body "Spec created: [\`${SPEC_DIR}/spec.md\`](${SPEC_DIR}/spec.md)"

5. Output

Spec created:

  Issue: https://github.com/Smana/cloud-native-ref/issues/XXX (label: spec:draft)
  Spec:  docs/specs/XXX-slug/spec.md

Next:
  1. Fill in the spec (use /clarify for [NEEDS CLARIFICATION] sections)
  2. Run /spec-status to see pipeline overview
  3. When starting work: gh issue edit XXX --remove-label "spec:draft" --add-label "spec:implementing"
  4. Implement the changes
  5. Reference in PR: "Implements #XXX"
  6. After merge: spec is auto-archived by GitHub Action

Template Location

docs/specs/templates/spec.md (~80 lines)

Clarifications

Use /clarify to resolve [NEEDS CLARIFICATION: ...] markers with structured options, or discuss conversationally with Claude.

Integration

  • /spec creates spec + issue with spec:draft label (this skill)
  • /spec-status shows pipeline overview (Draft/Implementing/Done counts)
  • /clarify resolves [NEEDS CLARIFICATION] markers with structured options
  • /create-pr auto-detects specs and references issue
  • /commit for commits
  • GitHub Action auto-archives specs on PR merge

Compétences associées

Looking for an alternative to spec or another community skill for your workflow? Explore these related open-source skills.

Voir tout

openclaw-release-maintainer

Logo of openclaw
openclaw

Your own personal AI assistant. Any OS. Any Platform. The lobster way. 🦞

widget-generator

Logo of f
f

Générez des plugins de widgets personnalisables pour le système de flux prompts.chat

flags

Logo of vercel
vercel

Le Cadre de Réaction

138.4k
0
Navigateur

pr-review

Logo of pytorch
pytorch

Tenseurs et réseaux neuronaux dynamiques en Python avec une forte accélération GPU

98.6k
0
Développeur