CtrlK
BlogDocsLog inGet started
Tessl Logo

k8s-manifest-generator

Create production-ready Kubernetes manifests for Deployments, Services, ConfigMaps, and Secrets following best practices and security standards. Use when generating Kubernetes YAML manifests, creating K8s resources, or implementing production-grade Kubernetes configurations.

86

1.15x
Quality

81%

Does it follow best practices?

Impact

97%

1.15x

Average score across 3 eval scenarios

SecuritybySnyk

Risky

Do not use without reviewing

SKILL.md
Quality
Evals
Security

Evaluation results

100%

16%

Deploy a Payment Processing Microservice to Production

Production deployment security and availability

Criteria
Without context
With context

No :latest image tag

100%

100%

Resource requests set

100%

100%

Resource limits set

100%

100%

Liveness probe present

100%

100%

Readiness probe present

100%

100%

Startup probe present

100%

100%

Pod security context non-root

100%

100%

Container drops all capabilities

100%

100%

No privilege escalation

100%

100%

Seccomp profile set

0%

100%

Minimum 3 replicas

100%

100%

Zero-downtime update strategy

100%

100%

Pod anti-affinity defined

100%

100%

Standard k8s labels used

0%

100%

Named container port

100%

100%

Graceful shutdown hook

0%

100%

100%

6%

Set Up a PostgreSQL Database Cluster for a Data Pipeline

Stateful database deployment pattern

Criteria
Without context
With context

StatefulSet used

100%

100%

Headless service defined

100%

100%

PVC template included

100%

100%

gp3 storage class used

100%

100%

ReadWriteOnce access mode

100%

100%

Data mounted at correct path

100%

100%

No :latest image tag

100%

100%

Pod security non-root

100%

100%

No privilege escalation

100%

100%

Standard k8s labels

0%

100%

Resource requests set

100%

100%

92%

16%

Prepare Configuration Manifests for a Customer-Facing API Service

Config and secret management with external access

Criteria
Without context
With context

ConfigMap for non-sensitive data

100%

100%

Secret for sensitive data

70%

80%

Secret uses stringData

0%

66%

Secret type Opaque or TLS appropriate

50%

62%

No plaintext secrets in manifests

100%

100%

External secret management recommended

100%

100%

envFrom snippet present

100%

100%

LoadBalancer service present

100%

100%

AWS NLB annotation used

100%

100%

Standard k8s labels on ConfigMap

0%

100%

Named ports in Service

100%

100%

ConfigMap non-sensitive values only

100%

100%

Repository
Dicklesworthstone/pi_agent_rust
Evaluated
Agent
Claude Code
Model
Claude Sonnet 4.6

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.