Redc-useage — cybersecurity Redc-useage, community, cybersecurity, ide skills, infrastructure, multi-cloud, redteam, terraform, Claude Code, Cursor, Windsurf

v1.0.0

このスキルについて

Terraformの統合を備えたマルチクラウドインフラストラクチャ管理の自動化が必要なクラウド管理エージェントに最適です。 Multi-cloud red team infrastructure automation. Deploy and manage cloud resources across AWS, Aliyun, Tencent Cloud with Terraform. Includes commands for init, deploy, manage, execute, and cleanup of infrastructure cases.

# Core Topics

wgpsec wgpsec
[137]
[18]
Updated: 3/19/2026

Killer-Skills Review

Decision support comes first. Repository text comes second.

Reference-Only Page Review Score: 9/11

This page remains useful for operators, but Killer-Skills treats it as reference material instead of a primary organic landing page.

Original recommendation layer Concrete use-case guidance Explicit limitations and caution Quality floor passed for review
Review Score
9/11
Quality Score
67
Canonical Locale
en
Detected Body Locale
en

Terraformの統合を備えたマルチクラウドインフラストラクチャ管理の自動化が必要なクラウド管理エージェントに最適です。 Multi-cloud red team infrastructure automation. Deploy and manage cloud resources across AWS, Aliyun, Tencent Cloud with Terraform. Includes commands for init, deploy, manage, execute, and cleanup of infrastructure cases.

このスキルを使用する理由

エージェントに、Terraformを使用してAWS、Aliyun、TencentCloudなどの複数のクラウド間でインフラストラクチャ管理を自動化する能力を提供し、シームレスな自動化と効率的なAI駆動ワークフローを実現し、YAML構成ファイルやテンプレート管理と統合します。

おすすめ

Terraformの統合を備えたマルチクラウドインフラストラクチャ管理の自動化が必要なクラウド管理エージェントに最適です。

実現可能なユースケース for Redc-useage

複数のクラウドプロバイダー間のインフラストラクチャのデプロイを自動化する
一貫したインフラストラクチャ管理のためにTerraformテンプレートを生成する
Redc-useageの自動化機能を使用してマルチクラウドインフラストラクチャの問題をデバッグする

! セキュリティと制限

  • Terraformのインストールと設定が必要
  • クラウドプロバイダーの資格情報(AWS_ACCESS_KEY_IDやALICLOUD_ACCESS_KEYなど)へのアクセスが必要
  • サポート対象のクラウドプロバイダー(AWS、Aliyun、TencentCloudなど)に限定される

Why this page is reference-only

  • - Current locale does not satisfy the locale-governance contract.

Source Boundary

The section below is supporting source material from the upstream repository. Use the Killer-Skills review above as the primary decision layer.

Labs Demo

Browser Sandbox Environment

⚡️ Ready to unleash?

Experience this Agent in a zero-setup browser environment powered by WebContainers. No installation required.

Boot Container Sandbox

FAQ & Installation Steps

These questions and steps mirror the structured data on this page for better search understanding.

? Frequently Asked Questions

What is Redc-useage?

Terraformの統合を備えたマルチクラウドインフラストラクチャ管理の自動化が必要なクラウド管理エージェントに最適です。 Multi-cloud red team infrastructure automation. Deploy and manage cloud resources across AWS, Aliyun, Tencent Cloud with Terraform. Includes commands for init, deploy, manage, execute, and cleanup of infrastructure cases.

How do I install Redc-useage?

Run the command: npx killer-skills add wgpsec/redc/Redc-useage. It works with Cursor, Windsurf, VS Code, Claude Code, and 19+ other IDEs.

What are the use cases for Redc-useage?

Key use cases include: 複数のクラウドプロバイダー間のインフラストラクチャのデプロイを自動化する, 一貫したインフラストラクチャ管理のためにTerraformテンプレートを生成する, Redc-useageの自動化機能を使用してマルチクラウドインフラストラクチャの問題をデバッグする.

Which IDEs are compatible with Redc-useage?

This skill is compatible with Cursor, Windsurf, VS Code, Trae, Claude Code, OpenClaw, Aider, Codex, OpenCode, Goose, Cline, Roo Code, Kiro, Augment Code, Continue, GitHub Copilot, Sourcegraph Cody, and Amazon Q Developer. Use the Killer-Skills CLI for universal one-command installation.

Are there any limitations for Redc-useage?

Terraformのインストールと設定が必要. クラウドプロバイダーの資格情報(AWS_ACCESS_KEY_IDやALICLOUD_ACCESS_KEYなど)へのアクセスが必要. サポート対象のクラウドプロバイダー(AWS、Aliyun、TencentCloudなど)に限定される.

How To Install

  1. 1. Open your terminal

    Open the terminal or command line in your project directory.

  2. 2. Run the install command

    Run: npx killer-skills add wgpsec/redc/Redc-useage. The CLI will automatically detect your IDE or AI agent and configure the skill.

  3. 3. Start using the skill

    The skill is now active. Your AI agent can use Redc-useage immediately in the current project.

! Reference-Only Mode

This page remains useful for installation and reference, but Killer-Skills no longer treats it as a primary indexable landing page. Read the review above before relying on the upstream repository instructions.

Imported Repository Instructions

The section below is supporting source material from the upstream repository. Use the Killer-Skills review above as the primary decision layer.

Supporting Evidence

Redc-useage

Install Redc-useage, an AI agent skill for AI agent workflows and automation. Works with Claude Code, Cursor, and Windsurf with one-command setup.

SKILL.md
Readonly
Imported Repository Instructions
The section below is supporting source material from the upstream repository. Use the Killer-Skills review above as the primary decision layer.
Supporting Evidence

Redc Skills - AI Operations Guide

Multi-cloud red team infrastructure automation tool built on Terraform.

Quick Reference

Config: ~/redc/config.yaml | Templates: ~/redc/redc-templates/ | Docs: https://github.com/wgpsec/redc

Configuration

yaml
1providers: 2 aws: 3 AWS_ACCESS_KEY_ID: "KEY" 4 AWS_SECRET_ACCESS_KEY: "SECRET" 5 region: "us-east-1" 6 aliyun: 7 ALICLOUD_ACCESS_KEY: "KEY" 8 ALICLOUD_SECRET_KEY: "SECRET" 9 region: "cn-hangzhou" 10 tencentcloud: 11 TENCENTCLOUD_SECRET_ID: "ID" 12 TENCENTCLOUD_SECRET_KEY: "KEY" 13 region: "ap-guangzhou"

Env vars: Set AWS_ACCESS_KEY_ID, ALICLOUD_ACCESS_KEY, TENCENTCLOUD_SECRET_ID, etc. if config.yaml unavailable.

Global Flags

FlagDefaultDescription
--config~/redc/config.yamlConfig file path
-u, --usersystemUser identifier
--projectdefaultProject name
--debugfalseDebug mode

Commands

Setup

bash
1redc init # Initialize templates 2redc pull <image> # Download template (e.g., aliyun/ecs) 3redc image ls # List local templates

Deploy

bash
1redc run <template> -n <name> -e key=val # Plan & start (create infrastructure) 2redc plan <template> -n <name> # Plan only (preview without creating) 3redc start <case-id> # Start case (create infrastructure)

Manage

bash
1redc ps # List all cases 2redc status <case-id> # Check status 3redc stop <case-id> # Stop infrastructure 4redc kill <case-id> # Stop & remove 5redc rm <case-id> # Remove case

Execute

bash
1redc exec <case-id> <command> # Run command 2redc exec -t <case-id> bash # Interactive shell 3redc cp <src> <case-id>:<dest> # Upload file 4redc cp <case-id>:<src> <dest> # Download file

Workflows

Quick Deploy:

bash
1redc pull aliyun/ecs && redc init 2redc run aliyun/ecs -n myserver -e password=Pass123 3# Returns case-id (e.g., 8a57078ee856) 4redc exec 8a57078ee856 whoami

Controlled:

bash
1redc plan aws/ec2 -n staging 2# Review the planned resources, then: 3redc start <case-id> 4redc cp deploy.sh <case-id>:/root/ 5redc exec <case-id> "bash /root/deploy.sh"

Cleanup:

bash
1redc stop <case-id> && redc rm <case-id> 2# Or: redc kill <case-id>

Automation

python
1import subprocess, re 2 3def redc_run(template, name, env=None): 4 cmd = ["redc", "run", template, "-n", name] 5 if env: 6 for k, v in env.items(): 7 cmd.extend(["-e", f"{k}={v}"]) 8 result = subprocess.run(cmd, capture_output=True, text=True, check=True) 9 match = re.search(r'[a-f0-9]{12,64}', result.stdout) 10 return match.group(0) if match else None 11 12# Usage 13case_id = redc_run("aliyun/ecs", "auto_deploy", {"password": "Secure123"})

Output Patterns

  • Success: in output
  • Error: in output
  • Case ID: [a-f0-9]{64} (use first 12 chars)
  • Status: running, stopped, created, error

Error Handling

ErrorSolution
Config not foundCreate ~/redc/config.yaml
Template not foundRun redc pull <template>
Case ID not foundCheck redc ps
SSH timeoutVerify instance running, security groups
Init failedCheck network, configure Terraform mirror

JSON Schemas

Case:

json
1{ 2 "id": "string[64]", 3 "name": "string", 4 "template": "string", 5 "status": "running|stopped|created|error", 6 "outputs": {"public_ip": "string"} 7}

Config:

json
1{ 2 "providers": { 3 "aws": {"AWS_ACCESS_KEY_ID": "string", "region": "string"} 4 } 5}

Best Practices

  • Use short IDs (first 12 chars)
  • Assign meaningful names: <project>_<purpose>_<env>
  • Always cleanup: redc stopredc rm
  • Use --debug for troubleshooting
  • Never commit config.yaml to version control
  • Monitor costs with redc ps

Resources

関連スキル

Looking for an alternative to Redc-useage or another community skill for your workflow? Explore these related open-source skills.

すべて表示

openclaw-release-maintainer

Logo of openclaw
openclaw

Your own personal AI assistant. Any OS. Any Platform. The lobster way. 🦞

333.8k
0
AI

widget-generator

Logo of f
f

カスタマイズ可能なウィジェットプラグインをprompts.chatのフィードシステム用に生成する

149.6k
0
AI

flags

Logo of vercel
vercel

React フレームワーク

138.4k
0
ブラウザ

pr-review

Logo of pytorch
pytorch

Pythonにおけるテンソルと動的ニューラルネットワーク(強力なGPUアクセラレーション)

98.6k
0
開発者