Redc-useage — cybersecurity Redc-useage, community, cybersecurity, ide skills, infrastructure, multi-cloud, redteam, terraform, Claude Code, Cursor, Windsurf

v1.0.0

이 스킬 정보

테라폼 통합을 갖춘 다중 클라우드 인프라 관리 자동화가 필요한 클라우드 관리 에이전트에 적합합니다. Multi-cloud red team infrastructure automation. Deploy and manage cloud resources across AWS, Aliyun, Tencent Cloud with Terraform. Includes commands for init, deploy, manage, execute, and cleanup of infrastructure cases.

# Core Topics

wgpsec wgpsec
[137]
[18]
Updated: 3/19/2026

Killer-Skills Review

Decision support comes first. Repository text comes second.

Reference-Only Page Review Score: 9/11

This page remains useful for operators, but Killer-Skills treats it as reference material instead of a primary organic landing page.

Original recommendation layer Concrete use-case guidance Explicit limitations and caution Quality floor passed for review
Review Score
9/11
Quality Score
67
Canonical Locale
en
Detected Body Locale
en

테라폼 통합을 갖춘 다중 클라우드 인프라 관리 자동화가 필요한 클라우드 관리 에이전트에 적합합니다. Multi-cloud red team infrastructure automation. Deploy and manage cloud resources across AWS, Aliyun, Tencent Cloud with Terraform. Includes commands for init, deploy, manage, execute, and cleanup of infrastructure cases.

이 스킬을 사용하는 이유

에이전트가 테라폼을 사용하여 AWS, Aliyun, TencentCloud 등의 다중 클라우드 간의 인프라 관리를 자동화할 수 있는 능력을 제공하며, 무결점 자동화와 효율적인 AI 구동 워크플로우를 구현하고, YAML 구성 파일 및 템플릿 관리와 통합합니다.

최적의 용도

테라폼 통합을 갖춘 다중 클라우드 인프라 관리 자동화가 필요한 클라우드 관리 에이전트에 적합합니다.

실행 가능한 사용 사례 for Redc-useage

다중 클라우드 제공업체 간의 인프라 배포 자동화
일관된 인프라 관리를 위한 테라폼 템플릿 생성
Redc-useage의 자동화 기능을 사용하여 다중 클라우드 인프라 문제 디버깅

! 보안 및 제한 사항

  • 테라폼 설치 및 구성이 필요
  • 클라우드 제공업체의 자격 증명(AWS_ACCESS_KEY_ID 및 ALICLOUD_ACCESS_KEY 등)에 대한 액세스가 필요
  • 지원되는 클라우드 제공업체(AWS, Aliyun, TencentCloud 등)로 제한됨

Why this page is reference-only

  • - Current locale does not satisfy the locale-governance contract.

Source Boundary

The section below is supporting source material from the upstream repository. Use the Killer-Skills review above as the primary decision layer.

Labs Demo

Browser Sandbox Environment

⚡️ Ready to unleash?

Experience this Agent in a zero-setup browser environment powered by WebContainers. No installation required.

Boot Container Sandbox

FAQ & Installation Steps

These questions and steps mirror the structured data on this page for better search understanding.

? Frequently Asked Questions

What is Redc-useage?

테라폼 통합을 갖춘 다중 클라우드 인프라 관리 자동화가 필요한 클라우드 관리 에이전트에 적합합니다. Multi-cloud red team infrastructure automation. Deploy and manage cloud resources across AWS, Aliyun, Tencent Cloud with Terraform. Includes commands for init, deploy, manage, execute, and cleanup of infrastructure cases.

How do I install Redc-useage?

Run the command: npx killer-skills add wgpsec/redc/Redc-useage. It works with Cursor, Windsurf, VS Code, Claude Code, and 19+ other IDEs.

What are the use cases for Redc-useage?

Key use cases include: 다중 클라우드 제공업체 간의 인프라 배포 자동화, 일관된 인프라 관리를 위한 테라폼 템플릿 생성, Redc-useage의 자동화 기능을 사용하여 다중 클라우드 인프라 문제 디버깅.

Which IDEs are compatible with Redc-useage?

This skill is compatible with Cursor, Windsurf, VS Code, Trae, Claude Code, OpenClaw, Aider, Codex, OpenCode, Goose, Cline, Roo Code, Kiro, Augment Code, Continue, GitHub Copilot, Sourcegraph Cody, and Amazon Q Developer. Use the Killer-Skills CLI for universal one-command installation.

Are there any limitations for Redc-useage?

테라폼 설치 및 구성이 필요. 클라우드 제공업체의 자격 증명(AWS_ACCESS_KEY_ID 및 ALICLOUD_ACCESS_KEY 등)에 대한 액세스가 필요. 지원되는 클라우드 제공업체(AWS, Aliyun, TencentCloud 등)로 제한됨.

How To Install

  1. 1. Open your terminal

    Open the terminal or command line in your project directory.

  2. 2. Run the install command

    Run: npx killer-skills add wgpsec/redc/Redc-useage. The CLI will automatically detect your IDE or AI agent and configure the skill.

  3. 3. Start using the skill

    The skill is now active. Your AI agent can use Redc-useage immediately in the current project.

! Reference-Only Mode

This page remains useful for installation and reference, but Killer-Skills no longer treats it as a primary indexable landing page. Read the review above before relying on the upstream repository instructions.

Imported Repository Instructions

The section below is supporting source material from the upstream repository. Use the Killer-Skills review above as the primary decision layer.

Supporting Evidence

Redc-useage

Install Redc-useage, an AI agent skill for AI agent workflows and automation. Works with Claude Code, Cursor, and Windsurf with one-command setup.

SKILL.md
Readonly
Imported Repository Instructions
The section below is supporting source material from the upstream repository. Use the Killer-Skills review above as the primary decision layer.
Supporting Evidence

Redc Skills - AI Operations Guide

Multi-cloud red team infrastructure automation tool built on Terraform.

Quick Reference

Config: ~/redc/config.yaml | Templates: ~/redc/redc-templates/ | Docs: https://github.com/wgpsec/redc

Configuration

yaml
1providers: 2 aws: 3 AWS_ACCESS_KEY_ID: "KEY" 4 AWS_SECRET_ACCESS_KEY: "SECRET" 5 region: "us-east-1" 6 aliyun: 7 ALICLOUD_ACCESS_KEY: "KEY" 8 ALICLOUD_SECRET_KEY: "SECRET" 9 region: "cn-hangzhou" 10 tencentcloud: 11 TENCENTCLOUD_SECRET_ID: "ID" 12 TENCENTCLOUD_SECRET_KEY: "KEY" 13 region: "ap-guangzhou"

Env vars: Set AWS_ACCESS_KEY_ID, ALICLOUD_ACCESS_KEY, TENCENTCLOUD_SECRET_ID, etc. if config.yaml unavailable.

Global Flags

FlagDefaultDescription
--config~/redc/config.yamlConfig file path
-u, --usersystemUser identifier
--projectdefaultProject name
--debugfalseDebug mode

Commands

Setup

bash
1redc init # Initialize templates 2redc pull <image> # Download template (e.g., aliyun/ecs) 3redc image ls # List local templates

Deploy

bash
1redc run <template> -n <name> -e key=val # Plan & start (create infrastructure) 2redc plan <template> -n <name> # Plan only (preview without creating) 3redc start <case-id> # Start case (create infrastructure)

Manage

bash
1redc ps # List all cases 2redc status <case-id> # Check status 3redc stop <case-id> # Stop infrastructure 4redc kill <case-id> # Stop & remove 5redc rm <case-id> # Remove case

Execute

bash
1redc exec <case-id> <command> # Run command 2redc exec -t <case-id> bash # Interactive shell 3redc cp <src> <case-id>:<dest> # Upload file 4redc cp <case-id>:<src> <dest> # Download file

Workflows

Quick Deploy:

bash
1redc pull aliyun/ecs && redc init 2redc run aliyun/ecs -n myserver -e password=Pass123 3# Returns case-id (e.g., 8a57078ee856) 4redc exec 8a57078ee856 whoami

Controlled:

bash
1redc plan aws/ec2 -n staging 2# Review the planned resources, then: 3redc start <case-id> 4redc cp deploy.sh <case-id>:/root/ 5redc exec <case-id> "bash /root/deploy.sh"

Cleanup:

bash
1redc stop <case-id> && redc rm <case-id> 2# Or: redc kill <case-id>

Automation

python
1import subprocess, re 2 3def redc_run(template, name, env=None): 4 cmd = ["redc", "run", template, "-n", name] 5 if env: 6 for k, v in env.items(): 7 cmd.extend(["-e", f"{k}={v}"]) 8 result = subprocess.run(cmd, capture_output=True, text=True, check=True) 9 match = re.search(r'[a-f0-9]{12,64}', result.stdout) 10 return match.group(0) if match else None 11 12# Usage 13case_id = redc_run("aliyun/ecs", "auto_deploy", {"password": "Secure123"})

Output Patterns

  • Success: in output
  • Error: in output
  • Case ID: [a-f0-9]{64} (use first 12 chars)
  • Status: running, stopped, created, error

Error Handling

ErrorSolution
Config not foundCreate ~/redc/config.yaml
Template not foundRun redc pull <template>
Case ID not foundCheck redc ps
SSH timeoutVerify instance running, security groups
Init failedCheck network, configure Terraform mirror

JSON Schemas

Case:

json
1{ 2 "id": "string[64]", 3 "name": "string", 4 "template": "string", 5 "status": "running|stopped|created|error", 6 "outputs": {"public_ip": "string"} 7}

Config:

json
1{ 2 "providers": { 3 "aws": {"AWS_ACCESS_KEY_ID": "string", "region": "string"} 4 } 5}

Best Practices

  • Use short IDs (first 12 chars)
  • Assign meaningful names: <project>_<purpose>_<env>
  • Always cleanup: redc stopredc rm
  • Use --debug for troubleshooting
  • Never commit config.yaml to version control
  • Monitor costs with redc ps

Resources

관련 스킬

Looking for an alternative to Redc-useage or another community skill for your workflow? Explore these related open-source skills.

모두 보기

openclaw-release-maintainer

Logo of openclaw
openclaw

Your own personal AI assistant. Any OS. Any Platform. The lobster way. 🦞

333.8k
0
인공지능

widget-generator

Logo of f
f

prompts.chat 피드 시스템을 위한 사용자 지정 가능한 위젯 플러그인을 생성합니다

149.6k
0
인공지능

flags

Logo of vercel
vercel

리액트 프레임워크

138.4k
0
브라우저

pr-review

Logo of pytorch
pytorch

파이썬에서 텐서와 동적 신경망 구현 및 강력한 GPU 가속 지원

98.6k
0
개발자