Claude-Skills terraform-patterns

install
source · Clone the upstream repo
git clone https://github.com/borghei/Claude-Skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/borghei/Claude-Skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/engineering/terraform-patterns" ~/.claude/skills/borghei-claude-skills-terraform-patterns && rm -rf "$T"
manifest: engineering/terraform-patterns/SKILL.md
source content

Terraform Patterns

Category: Engineering Domain: Infrastructure as Code

Overview

The Terraform Patterns skill provides automated analysis of Terraform configurations for module complexity, security misconfigurations, and infrastructure best practices. It catches open ports, public buckets, missing encryption, and overly permissive IAM policies before they reach production.

Quick Start

# Analyze Terraform module structure and complexity
python scripts/tf_module_analyzer.py --path ./modules/vpc

# Scan for security misconfigurations
python scripts/tf_security_scanner.py --path ./environments/production

# JSON output for CI pipelines
python scripts/tf_security_scanner.py --path . --format json

# Recursive analysis of all modules
python scripts/tf_module_analyzer.py --path . --recursive

Tools Overview

tf_module_analyzer.py

Analyzes Terraform modules for complexity, structure, dependencies, and documentation quality.

FeatureDescription
Complexity scoringScores modules by resource count, variable count, nesting
Dependency mappingMaps module dependencies and data source usage
Variable analysisChecks for missing types, defaults, descriptions
Output completenessValidates output documentation and coverage
Naming conventionsChecks resource and variable naming patterns

tf_security_scanner.py

Scans Terraform configurations for security misconfigurations and compliance violations.

FeatureDescription
Open portsDetects 0.0.0.0/0 CIDR in security groups
Public accessFlags public S3 buckets, databases, instances
Encryption gapsChecks for missing encryption at rest and in transit
IAM overreachIdentifies wildcard actions and overly broad policies
Logging gapsVerifies CloudTrail, flow logs, access logging

Workflows

Security Review Workflow

  1. Scan - Run tf_security_scanner.py across all environments
  2. Triage - Prioritize critical findings (public data, open access)
  3. Remediate - Apply recommended fixes per finding
  4. Verify - Re-scan to confirm fixes resolved issues
  5. Gate - Add scanner to PR checks for continuous enforcement

Module Quality Workflow

  1. Analyze - Run tf_module_analyzer.py on each module
  2. Score - Review complexity scores, identify modules over threshold
  3. Refactor - Break down modules scoring above 70/100 complexity
  4. Document - Fill in missing variable and output descriptions
  5. Standardize - Apply consistent naming and file organization

CI Integration

# Security gate
python scripts/tf_security_scanner.py --path . --format json --min-severity high
if [ $? -ne 0 ]; then
  echo "Security scan failed - blocking merge"
  exit 1
fi

# Module quality check
python scripts/tf_module_analyzer.py --path . --recursive --format json

Reference Documentation

Common Patterns Quick Reference

Module Structure

modules/vpc/
  main.tf           # Primary resources
  variables.tf      # Input variables with descriptions
  outputs.tf        # Module outputs
  versions.tf       # Required providers and versions
  locals.tf         # Local values and computed expressions

Security Checklist

ResourceCheckRule
Security GroupsNo 0.0.0.0/0 ingressRestrict to known CIDRs
S3 BucketsNo public ACLsUse bucket policies instead
RDSNo public accessSet publicly_accessible = false
EBS/S3/RDSEncryption enabledAdd encryption configuration
IAMNo wildcard actionsUse least-privilege policies
CloudTrailEnabled in all regionsis_multi_region_trail = true
VPCFlow logs enabledCreate flow log resources

Complexity Scoring

ScoreRatingAction
0-30LowNo action needed
31-60MediumConsider splitting
61-80HighShould refactor
81-100CriticalMust refactor