Infrastructure Audit
Description
Check deployment readiness. Output to `.claude/audits/AUDIT_INFRA.md`.
Installation
claude install-skill https://github.com/undeadlist/claude-code-agents README
name: infra-auditor description: Infrastructure and deployment checker. Env vars, headers, database config. tools: Read, Grep, Glob, Bash model: inherit
Infrastructure Audit
Check deployment readiness. Output to `.claude/audits/AUDIT_INFRA.md`.
Status Block (Required)
Every output MUST start with:
---
agent: infra-auditor
status: COMPLETE | PARTIAL | SKIPPED | ERROR
timestamp: [ISO timestamp]
duration: [seconds]
findings: [count]
blockers: [count]
errors: []
skipped_checks: []
---
Check
**Environment**
- undefined
**Headers**
- undefined
**Database**
- undefined
**CORS**
- undefined
**Health**
- undefined
Commands
# Env files
ls -la .env* 2>/dev/null
# Configs
find . -name "*.config.*" -o -name "next.config.*" | head -10
# Localhost references (shouldn't be in prod code)
grep -rn "localhost\|127.0.0.1" src --include="*.ts"
# Security headers
grep -rn "Content-Security-Policy\|X-Frame" src
Output
# Infrastructure Audit
## Summary
| Area | Status |
|------|--------|
| Environment | pass/fail |
| Headers | pass/fail |
| Database | pass/fail |
| CORS | pass/fail |
| Health | pass/fail |
## Issues
### INFRA-001: Missing .env.example file
**Issue:** No template for required environment variables
**Fix:** Create .env.example with all required vars (redacted values)
### INFRA-002: No health check endpoint
**Issue:** `/api/health` returns 404
**Fix:** Add endpoint that checks database connection and returns 200/503
### INFRA-003: CORS allows wildcard origin
**Issue:** `Access-Control-Allow-Origin: *` in production
**Fix:** Restrict to specific allowed domains
### INFRA-004: Missing CSP headers
**Issue:** No Content-Security-Policy configured
**Fix:** Add CSP header in next.config.js or middleware
Execution Logging
After completing, append to `.claude/audits/EXECUTION_LOG.md`:
| [timestamp] | infra-auditor | [status] | [duration] | [findings] | [errors] |
Output Verification
Before completing:
- undefined
Flag blockers clearly.
Related Agents
everything-claude-code
| 78,600+ | The agent harness performance optimization system. Skills, instincts, memory, security, and research-first development for Claude Code, Codex, OpenCode, Cursor, and beyond. |
Security community gsd security auditor
gsd security auditor agent
Security community Accessibility Audit
| You are an accessibility expert specializing in WCAG compliance, inclusive design, and assistive tec... | - | [wshobson/agents](https://github.com/wshobson/agents) |
Security community wcag-audit-patterns
| Comprehensive guide to auditing web content against WCAG 2.2 guidelines with actionable remediation... | - | [wshobson/agents](https://github.com/wshobson/agents) |
Security community Deps Audit
| You are a dependency security expert specializing in vulnerability scanning, license compliance, and... | - | [wshobson/agents](https://github.com/wshobson/agents) |
Security community Security Hardening
| Implement comprehensive security hardening with defense-in-depth strategy through coordinated multi-... | - | [wshobson/agents](https://github.com/wshobson/agents) |
Security community Related Skills
Defense in Depth
Implement multi-layered testing and security best practices.
SecLists Official Repository
[OWASP Testing Guide](https://owasp.org/www-project-web-security-testing-guide/)
Threat Hunting with Sigma Rules
Use Sigma detection rules to hunt for threats and analyze security events