Redc-useage — cybersecurity Redc-useage, community, cybersecurity, ide skills, infrastructure, multi-cloud, redteam, terraform

v1.0.0

Sobre este Skill

Perfeito para Agentes de Gerenciamento de Nuvem que necessitam de gerenciamento de infraestrutura de multi-nuvem automatizado com integração do Terraform. Multi-cloud red team infrastructure automation. Deploy and manage cloud resources across AWS, Aliyun, Tencent Cloud with Terraform. Includes commands for init, deploy, manage, execute, and cleanup of infrastructure cases.

# Core Topics

wgpsec wgpsec
[137]
[18]
Updated: 3/19/2026

Killer-Skills Review

Decision support comes first. Repository text comes second.

Reference-Only Page Review Score: 9/11

This page remains useful for operators, but Killer-Skills treats it as reference material instead of a primary organic landing page.

Original recommendation layer Concrete use-case guidance Explicit limitations and caution Quality floor passed for review
Review Score
9/11
Quality Score
67
Canonical Locale
en
Detected Body Locale
en

Perfeito para Agentes de Gerenciamento de Nuvem que necessitam de gerenciamento de infraestrutura de multi-nuvem automatizado com integração do Terraform. Multi-cloud red team infrastructure automation. Deploy and manage cloud resources across AWS, Aliyun, Tencent Cloud with Terraform. Includes commands for init, deploy, manage, execute, and cleanup of infrastructure cases.

Por que usar essa habilidade

Habilita os agentes a automatizar o gerenciamento de infraestrutura em várias nuvens, incluindo AWS, Aliyun e TencentCloud, usando o Terraform para automação sem problemas e fluxos de trabalho eficientes alimentados por IA, além de integrar com arquivos de configuração YAML e gerenciamento de modelos.

Melhor para

Perfeito para Agentes de Gerenciamento de Nuvem que necessitam de gerenciamento de infraestrutura de multi-nuvem automatizado com integração do Terraform.

Casos de Uso Práticos for Redc-useage

Automatizar a implantação de infraestrutura em vários provedores de nuvem
Gerar modelos do Terraform para gerenciamento de infraestrutura consistente
Depurar problemas de infraestrutura de multi-nuvem usando as capacidades de automação do Redc-useage

! Segurança e Limitações

  • Requer instalação e configuração do Terraform
  • Necessita acesso às credenciais dos provedores de nuvem, como AWS_ACCESS_KEY_ID e ALICLOUD_ACCESS_KEY
  • Limitado aos provedores de nuvem suportados, incluindo AWS, Aliyun e TencentCloud

Why this page is reference-only

  • - Current locale does not satisfy the locale-governance contract.

Source Boundary

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

After The Review

Decide The Next Action Before You Keep Reading Repository Material

Killer-Skills should not stop at opening repository instructions. It should help you decide whether to install this skill, when to cross-check against trusted collections, and when to move into workflow rollout.

Labs Demo

Browser Sandbox Environment

⚡️ Ready to unleash?

Experience this Agent in a zero-setup browser environment powered by WebContainers. No installation required.

Boot Container Sandbox

FAQ & Installation Steps

These questions and steps mirror the structured data on this page for better search understanding.

? Frequently Asked Questions

What is Redc-useage?

Perfeito para Agentes de Gerenciamento de Nuvem que necessitam de gerenciamento de infraestrutura de multi-nuvem automatizado com integração do Terraform. Multi-cloud red team infrastructure automation. Deploy and manage cloud resources across AWS, Aliyun, Tencent Cloud with Terraform. Includes commands for init, deploy, manage, execute, and cleanup of infrastructure cases.

How do I install Redc-useage?

Run the command: npx killer-skills add wgpsec/redc/Redc-useage. It works with Cursor, Windsurf, VS Code, Claude Code, and 19+ other IDEs.

What are the use cases for Redc-useage?

Key use cases include: Automatizar a implantação de infraestrutura em vários provedores de nuvem, Gerar modelos do Terraform para gerenciamento de infraestrutura consistente, Depurar problemas de infraestrutura de multi-nuvem usando as capacidades de automação do Redc-useage.

Which IDEs are compatible with Redc-useage?

This skill is compatible with Cursor, Windsurf, VS Code, Trae, Claude Code, OpenClaw, Aider, Codex, OpenCode, Goose, Cline, Roo Code, Kiro, Augment Code, Continue, GitHub Copilot, Sourcegraph Cody, and Amazon Q Developer. Use the Killer-Skills CLI for universal one-command installation.

Are there any limitations for Redc-useage?

Requer instalação e configuração do Terraform. Necessita acesso às credenciais dos provedores de nuvem, como AWS_ACCESS_KEY_ID e ALICLOUD_ACCESS_KEY. Limitado aos provedores de nuvem suportados, incluindo AWS, Aliyun e TencentCloud.

How To Install

  1. 1. Open your terminal

    Open the terminal or command line in your project directory.

  2. 2. Run the install command

    Run: npx killer-skills add wgpsec/redc/Redc-useage. The CLI will automatically detect your IDE or AI agent and configure the skill.

  3. 3. Start using the skill

    The skill is now active. Your AI agent can use Redc-useage immediately in the current project.

! Reference-Only Mode

This page remains useful for installation and reference, but Killer-Skills no longer treats it as a primary indexable landing page. Read the review above before relying on the upstream repository instructions.

Upstream Repository Material

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

Upstream Source

Redc-useage

Install Redc-useage, an AI agent skill for AI agent workflows and automation. Review the use cases, limitations, and setup path before rollout.

SKILL.md
Readonly
Upstream Repository Material
The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.
Supporting Evidence

Redc Skills - AI Operations Guide

Multi-cloud red team infrastructure automation tool built on Terraform.

Quick Reference

Config: ~/redc/config.yaml | Templates: ~/redc/redc-templates/ | Docs: https://github.com/wgpsec/redc

Configuration

yaml
1providers: 2 aws: 3 AWS_ACCESS_KEY_ID: "KEY" 4 AWS_SECRET_ACCESS_KEY: "SECRET" 5 region: "us-east-1" 6 aliyun: 7 ALICLOUD_ACCESS_KEY: "KEY" 8 ALICLOUD_SECRET_KEY: "SECRET" 9 region: "cn-hangzhou" 10 tencentcloud: 11 TENCENTCLOUD_SECRET_ID: "ID" 12 TENCENTCLOUD_SECRET_KEY: "KEY" 13 region: "ap-guangzhou"

Env vars: Set AWS_ACCESS_KEY_ID, ALICLOUD_ACCESS_KEY, TENCENTCLOUD_SECRET_ID, etc. if config.yaml unavailable.

Global Flags

FlagDefaultDescription
--config~/redc/config.yamlConfig file path
-u, --usersystemUser identifier
--projectdefaultProject name
--debugfalseDebug mode

Commands

Setup

bash
1redc init # Initialize templates 2redc pull <image> # Download template (e.g., aliyun/ecs) 3redc image ls # List local templates

Deploy

bash
1redc run <template> -n <name> -e key=val # Plan & start (create infrastructure) 2redc plan <template> -n <name> # Plan only (preview without creating) 3redc start <case-id> # Start case (create infrastructure)

Manage

bash
1redc ps # List all cases 2redc status <case-id> # Check status 3redc stop <case-id> # Stop infrastructure 4redc kill <case-id> # Stop & remove 5redc rm <case-id> # Remove case

Execute

bash
1redc exec <case-id> <command> # Run command 2redc exec -t <case-id> bash # Interactive shell 3redc cp <src> <case-id>:<dest> # Upload file 4redc cp <case-id>:<src> <dest> # Download file

Workflows

Quick Deploy:

bash
1redc pull aliyun/ecs && redc init 2redc run aliyun/ecs -n myserver -e password=Pass123 3# Returns case-id (e.g., 8a57078ee856) 4redc exec 8a57078ee856 whoami

Controlled:

bash
1redc plan aws/ec2 -n staging 2# Review the planned resources, then: 3redc start <case-id> 4redc cp deploy.sh <case-id>:/root/ 5redc exec <case-id> "bash /root/deploy.sh"

Cleanup:

bash
1redc stop <case-id> && redc rm <case-id> 2# Or: redc kill <case-id>

Automation

python
1import subprocess, re 2 3def redc_run(template, name, env=None): 4 cmd = ["redc", "run", template, "-n", name] 5 if env: 6 for k, v in env.items(): 7 cmd.extend(["-e", f"{k}={v}"]) 8 result = subprocess.run(cmd, capture_output=True, text=True, check=True) 9 match = re.search(r'[a-f0-9]{12,64}', result.stdout) 10 return match.group(0) if match else None 11 12# Usage 13case_id = redc_run("aliyun/ecs", "auto_deploy", {"password": "Secure123"})

Output Patterns

  • Success: in output
  • Error: in output
  • Case ID: [a-f0-9]{64} (use first 12 chars)
  • Status: running, stopped, created, error

Error Handling

ErrorSolution
Config not foundCreate ~/redc/config.yaml
Template not foundRun redc pull <template>
Case ID not foundCheck redc ps
SSH timeoutVerify instance running, security groups
Init failedCheck network, configure Terraform mirror

JSON Schemas

Case:

json
1{ 2 "id": "string[64]", 3 "name": "string", 4 "template": "string", 5 "status": "running|stopped|created|error", 6 "outputs": {"public_ip": "string"} 7}

Config:

json
1{ 2 "providers": { 3 "aws": {"AWS_ACCESS_KEY_ID": "string", "region": "string"} 4 } 5}

Best Practices

  • Use short IDs (first 12 chars)
  • Assign meaningful names: <project>_<purpose>_<env>
  • Always cleanup: redc stopredc rm
  • Use --debug for troubleshooting
  • Never commit config.yaml to version control
  • Monitor costs with redc ps

Resources

Habilidades Relacionadas

Looking for an alternative to Redc-useage or another community skill for your workflow? Explore these related open-source skills.

Ver tudo

openclaw-release-maintainer

Logo of openclaw
openclaw

Your own personal AI assistant. Any OS. Any Platform. The lobster way. 🦞

widget-generator

Logo of f
f

Gerar plugins de widgets personalizáveis para o sistema de feed do prompts.chat

flags

Logo of vercel
vercel

O Framework React

138.4k
0
Navegador

pr-review

Logo of pytorch
pytorch

Tensors and Dynamic neural networks in Python with strong GPU acceleration

98.6k
0
Desenvolvedor