Skillquality 0.46
vigilante-issue-implementation-on-kubernetes
Implement a GitHub issue end-to-end when Vigilante dispatches work for a Kubernetes-focused repository with manifest hardening and workload security guidance.
Price
free
Protocol
skill
Verified
no
What it does
Vigilante Kubernetes Issue Implementation
Focus
- Read the prompt for detected tech stacks, process hints, and Kubernetes security guidance before changing manifests.
- Treat Kubernetes manifest changes as operationally sensitive — not as generic YAML edits.
- Keep changes scoped to the issue and do not broaden into unrelated cluster-ops or security redesign work.
Manifest Hygiene
- Use recommended Kubernetes labels (
app.kubernetes.io/name,app.kubernetes.io/version, etc.) on all new resources. - Validate manifest YAML syntax before committing. Use
kubectl --dry-run=client -o yamlor an equivalent offline validator when available. - Prefer
kustomizeoverlays or Helm values for environment-specific configuration rather than duplicating manifests. - Keep resource definitions focused — one resource per file when practical, with clear naming.
Service Account Hygiene
- Do not use the
defaultservice account for workloads. Create dedicated service accounts scoped to the workload's needs. - Set
automountServiceAccountToken: falseon pods and service accounts that do not need API access. - When a workload requires API access, bind the minimum RBAC permissions to its dedicated service account.
Pod and Container Security Context
- Set
runAsNonRoot: trueand specify a numericrunAsUserin the pod or containersecurityContext. - Set
allowPrivilegeEscalation: falseon containers. - Set
readOnlyRootFilesystem: truewhere the application supports it, usingemptyDirvolumes for writable paths. - Drop all capabilities and add back only what is required:
securityContext.capabilities.drop: ["ALL"]. - Prefer
RestrictedPod Security Standards when the workload allows it.
RBAC and Permissions
- Follow least-privilege principles: prefer
RoleandRoleBinding(namespace-scoped) overClusterRoleandClusterRoleBindingunless the workload genuinely needs cluster-wide access. - Avoid wildcards (
*) in RBAC rules for verbs, resources, or API groups. - When the issue only requires application-level changes, do not introduce or modify cluster-scoped resources.
Image Security
- Use image digests or pinned tags rather than
latestor other mutable tags. - Prefer images from trusted registries. Note when an image source is unverified.
- Be aware of image scanning and admission policies when the repository documents them.
Network Policy and Resource Management
- When touching network-facing workloads, check whether a
NetworkPolicyexists and preserve or extend it rather than removing restrictions. - Set resource
requestsandlimitson containers to prevent unbounded resource consumption. - Do not remove existing resource constraints without explicit justification in the issue.
Scope Guardrails
- Do not make broad cluster-wide changes when the issue only requires application-level manifest updates.
- Do not introduce cluster-admin RBAC, node-level access, or host-namespace usage unless the issue specifically requires it.
- Preserve existing security posture — improve it where relevant to the issue, but do not weaken it.
Mixed-Stack Repositories
- A Kubernetes repository may also contain application code (Go, Node.js, Python, etc.) alongside manifests.
- Scope Kubernetes manifest guidance to YAML/Helm/Kustomize files. Do not apply manifest validation to application source code.
- When an issue touches both application code and Kubernetes manifests, validate each side with its appropriate toolchain.
Workflow
- Follow the base
vigilante-issue-implementationworkflow for issue comments, validation, push, and PR creation. - Use
vigilante commitfor all commit-producing operations. Do not usegit commitor GitHub CLI commit flows directly. - Any commit or amend must preserve the user's existing git author, committer, and signing configuration. Commit on behalf of the user and do not overwrite
git configwith a coding-agent identity. - Do not add
Co-authored by:trailers or any other agent attribution for Codex, Claude, Gemini, or similar coding-agent identities. - Repository-specific instructions (
AGENTS.md,README.md, CI config) remain authoritative when they are more specific than the generic Kubernetes guidance in this skill.
Capabilities
skillsource-aliengiraffeskill-vigilante-issue-implementation-on-kubernetestopic-agenttopic-agent-skillstopic-agentic-aitopic-agentic-workflowtopic-agentstopic-ai-orchestrationtopic-ai-orchestratortopic-orchestration
Install
Installnpx skills add aliengiraffe/vigilante
Transportskills-sh
Protocolskill
Quality
0.46/ 1.00
deterministic score 0.46 from registry signals: · indexed on github topic:agent-skills · 28 github stars · SKILL.md body (4,264 chars)
Provenance
Indexed fromgithub
Enriched2026-05-01 07:01:24Z · deterministic:skill-github:v1 · v1
First seen2026-04-18
Last seen2026-05-01