feat(skills): add research-summarizer and docker-development agent skills
research-summarizer (product-team/): - Structured research summarization for papers, articles, reports - Slash commands: /research:summarize, /research:compare, /research:cite - Python tools: extract_citations.py (5 citation formats), format_summary.py (6 templates) - References: summary-templates.md, citation-formats.md docker-development (engineering/): - Dockerfile optimization, compose orchestration, container security - Slash commands: /docker:optimize, /docker:compose, /docker:security - Python tools: dockerfile_analyzer.py (15 rules), compose_validator.py (best practices) - References: dockerfile-best-practices.md, compose-patterns.md Both skills include .claude-plugin/plugin.json and follow POWERFUL tier conventions. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
This commit is contained in:
366
engineering/docker-development/SKILL.md
Normal file
366
engineering/docker-development/SKILL.md
Normal file
@@ -0,0 +1,366 @@
|
||||
---
|
||||
name: "docker-development"
|
||||
description: "Docker and container development agent skill and plugin for Dockerfile optimization, docker-compose orchestration, multi-stage builds, and container security hardening. Use when: user wants to optimize a Dockerfile, create or improve docker-compose configurations, implement multi-stage builds, audit container security, reduce image size, or follow container best practices. Covers build performance, layer caching, secret management, and production-ready container patterns."
|
||||
license: MIT
|
||||
metadata:
|
||||
version: 1.0.0
|
||||
author: Alireza Rezvani
|
||||
category: engineering
|
||||
updated: 2026-03-16
|
||||
---
|
||||
|
||||
# Docker Development
|
||||
|
||||
> Smaller images. Faster builds. Secure containers. No guesswork.
|
||||
|
||||
Opinionated Docker workflow that turns bloated Dockerfiles into production-grade containers. Covers optimization, multi-stage builds, compose orchestration, and security hardening.
|
||||
|
||||
Not a Docker tutorial — a set of concrete decisions about how to build containers that don't waste time, space, or attack surface.
|
||||
|
||||
---
|
||||
|
||||
## Slash Commands
|
||||
|
||||
| Command | What it does |
|
||||
|---------|-------------|
|
||||
| `/docker:optimize` | Analyze and optimize a Dockerfile for size, speed, and layer caching |
|
||||
| `/docker:compose` | Generate or improve docker-compose.yml with best practices |
|
||||
| `/docker:security` | Audit a Dockerfile or running container for security issues |
|
||||
|
||||
---
|
||||
|
||||
## When This Skill Activates
|
||||
|
||||
Recognize these patterns from the user:
|
||||
|
||||
- "Optimize this Dockerfile"
|
||||
- "My Docker build is slow"
|
||||
- "Create a docker-compose for this project"
|
||||
- "Is this Dockerfile secure?"
|
||||
- "Reduce my Docker image size"
|
||||
- "Set up multi-stage builds"
|
||||
- "Docker best practices for [language/framework]"
|
||||
- Any request involving: Dockerfile, docker-compose, container, image size, build cache, Docker security
|
||||
|
||||
If the user has a Dockerfile or wants to containerize something → this skill applies.
|
||||
|
||||
---
|
||||
|
||||
## Workflow
|
||||
|
||||
### `/docker:optimize` — Dockerfile Optimization
|
||||
|
||||
1. **Analyze current state**
|
||||
- Read the Dockerfile
|
||||
- Identify base image and its size
|
||||
- Count layers (each RUN/COPY/ADD = 1 layer)
|
||||
- Check for common anti-patterns
|
||||
|
||||
2. **Apply optimization checklist**
|
||||
|
||||
```
|
||||
BASE IMAGE
|
||||
├── Use specific tags, never :latest in production
|
||||
├── Prefer slim/alpine variants (debian-slim > ubuntu > debian)
|
||||
├── Pin digest for reproducibility in CI: image@sha256:...
|
||||
└── Match base to runtime needs (don't use python:3.12 for a compiled binary)
|
||||
|
||||
LAYER OPTIMIZATION
|
||||
├── Combine related RUN commands with && \
|
||||
├── Order layers: least-changing first (deps before source code)
|
||||
├── Clean package manager cache in the same RUN layer
|
||||
├── Use .dockerignore to exclude unnecessary files
|
||||
└── Separate build deps from runtime deps
|
||||
|
||||
BUILD CACHE
|
||||
├── COPY dependency files before source code (package.json, requirements.txt, go.mod)
|
||||
├── Install deps in a separate layer from code copy
|
||||
├── Use BuildKit cache mounts: --mount=type=cache,target=/root/.cache
|
||||
└── Avoid COPY . . before dependency installation
|
||||
|
||||
MULTI-STAGE BUILDS
|
||||
├── Stage 1: build (full SDK, build tools, dev deps)
|
||||
├── Stage 2: runtime (minimal base, only production artifacts)
|
||||
├── COPY --from=builder only what's needed
|
||||
└── Final image should have NO build tools, NO source code, NO dev deps
|
||||
```
|
||||
|
||||
3. **Generate optimized Dockerfile**
|
||||
- Apply all relevant optimizations
|
||||
- Add inline comments explaining each decision
|
||||
- Report estimated size reduction
|
||||
|
||||
4. **Validate**
|
||||
```bash
|
||||
python3 scripts/dockerfile_analyzer.py Dockerfile
|
||||
```
|
||||
|
||||
### `/docker:compose` — Docker Compose Configuration
|
||||
|
||||
1. **Identify services**
|
||||
- Application (web, API, worker)
|
||||
- Database (postgres, mysql, redis, mongo)
|
||||
- Cache (redis, memcached)
|
||||
- Queue (rabbitmq, kafka)
|
||||
- Reverse proxy (nginx, traefik, caddy)
|
||||
|
||||
2. **Apply compose best practices**
|
||||
|
||||
```
|
||||
SERVICES
|
||||
├── Use depends_on with condition: service_healthy
|
||||
├── Add healthchecks for every service
|
||||
├── Set resource limits (mem_limit, cpus)
|
||||
├── Use named volumes for persistent data
|
||||
└── Pin image versions
|
||||
|
||||
NETWORKING
|
||||
├── Create explicit networks (don't rely on default)
|
||||
├── Separate frontend and backend networks
|
||||
├── Only expose ports that need external access
|
||||
└── Use internal: true for backend-only networks
|
||||
|
||||
ENVIRONMENT
|
||||
├── Use env_file for secrets, not inline environment
|
||||
├── Never commit .env files (add to .gitignore)
|
||||
├── Use variable substitution: ${VAR:-default}
|
||||
└── Document all required env vars
|
||||
|
||||
DEVELOPMENT vs PRODUCTION
|
||||
├── Use compose profiles or override files
|
||||
├── Dev: bind mounts for hot reload, debug ports exposed
|
||||
├── Prod: named volumes, no debug ports, restart: unless-stopped
|
||||
└── docker-compose.override.yml for dev-only config
|
||||
```
|
||||
|
||||
3. **Generate compose file**
|
||||
- Output docker-compose.yml with healthchecks, networks, volumes
|
||||
- Generate .env.example with all required variables documented
|
||||
- Add dev/prod profile annotations
|
||||
|
||||
### `/docker:security` — Container Security Audit
|
||||
|
||||
1. **Dockerfile audit**
|
||||
|
||||
| Check | Severity | Fix |
|
||||
|-------|----------|-----|
|
||||
| Running as root | Critical | Add `USER nonroot` after creating user |
|
||||
| Using :latest tag | High | Pin to specific version |
|
||||
| Secrets in ENV/ARG | Critical | Use BuildKit secrets: `--mount=type=secret` |
|
||||
| COPY with broad glob | Medium | Use specific paths, add .dockerignore |
|
||||
| Unnecessary EXPOSE | Low | Only expose ports the app uses |
|
||||
| No HEALTHCHECK | Medium | Add HEALTHCHECK with appropriate interval |
|
||||
| Privileged instructions | High | Avoid `--privileged`, drop capabilities |
|
||||
| Package manager cache retained | Low | Clean in same RUN layer |
|
||||
|
||||
2. **Runtime security checks**
|
||||
|
||||
| Check | Severity | Fix |
|
||||
|-------|----------|-----|
|
||||
| Container running as root | Critical | Set user in Dockerfile or compose |
|
||||
| Writable root filesystem | Medium | Use `read_only: true` in compose |
|
||||
| All capabilities retained | High | Drop all, add only needed: `cap_drop: [ALL]` |
|
||||
| No resource limits | Medium | Set `mem_limit` and `cpus` |
|
||||
| Host network mode | High | Use bridge or custom network |
|
||||
| Sensitive mounts | Critical | Never mount /etc, /var/run/docker.sock in prod |
|
||||
| No log driver configured | Low | Set `logging:` with size limits |
|
||||
|
||||
3. **Generate security report**
|
||||
```
|
||||
SECURITY AUDIT — [Dockerfile/Image name]
|
||||
Date: [timestamp]
|
||||
|
||||
CRITICAL: [count]
|
||||
HIGH: [count]
|
||||
MEDIUM: [count]
|
||||
LOW: [count]
|
||||
|
||||
[Detailed findings with fix recommendations]
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## Tooling
|
||||
|
||||
### `scripts/dockerfile_analyzer.py`
|
||||
|
||||
CLI utility for static analysis of Dockerfiles.
|
||||
|
||||
**Features:**
|
||||
- Layer count and optimization suggestions
|
||||
- Base image analysis with size estimates
|
||||
- Anti-pattern detection (15+ rules)
|
||||
- Security issue flagging
|
||||
- Multi-stage build detection and validation
|
||||
- JSON and text output
|
||||
|
||||
**Usage:**
|
||||
```bash
|
||||
# Analyze a Dockerfile
|
||||
python3 scripts/dockerfile_analyzer.py Dockerfile
|
||||
|
||||
# JSON output
|
||||
python3 scripts/dockerfile_analyzer.py Dockerfile --output json
|
||||
|
||||
# Analyze with security focus
|
||||
python3 scripts/dockerfile_analyzer.py Dockerfile --security
|
||||
|
||||
# Check a specific directory
|
||||
python3 scripts/dockerfile_analyzer.py path/to/Dockerfile
|
||||
```
|
||||
|
||||
### `scripts/compose_validator.py`
|
||||
|
||||
CLI utility for validating docker-compose files.
|
||||
|
||||
**Features:**
|
||||
- Service dependency validation
|
||||
- Healthcheck presence detection
|
||||
- Network configuration analysis
|
||||
- Volume mount validation
|
||||
- Environment variable audit
|
||||
- Port conflict detection
|
||||
- Best practice scoring
|
||||
|
||||
**Usage:**
|
||||
```bash
|
||||
# Validate a compose file
|
||||
python3 scripts/compose_validator.py docker-compose.yml
|
||||
|
||||
# JSON output
|
||||
python3 scripts/compose_validator.py docker-compose.yml --output json
|
||||
|
||||
# Strict mode (fail on warnings)
|
||||
python3 scripts/compose_validator.py docker-compose.yml --strict
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## Multi-Stage Build Patterns
|
||||
|
||||
### Pattern 1: Compiled Language (Go, Rust, C++)
|
||||
|
||||
```dockerfile
|
||||
# Build stage
|
||||
FROM golang:1.22-alpine AS builder
|
||||
WORKDIR /app
|
||||
COPY go.mod go.sum ./
|
||||
RUN go mod download
|
||||
COPY . .
|
||||
RUN CGO_ENABLED=0 go build -ldflags="-s -w" -o /app/server ./cmd/server
|
||||
|
||||
# Runtime stage
|
||||
FROM gcr.io/distroless/static-debian12
|
||||
COPY --from=builder /app/server /server
|
||||
USER nonroot:nonroot
|
||||
ENTRYPOINT ["/server"]
|
||||
```
|
||||
|
||||
### Pattern 2: Node.js / TypeScript
|
||||
|
||||
```dockerfile
|
||||
# Dependencies stage
|
||||
FROM node:20-alpine AS deps
|
||||
WORKDIR /app
|
||||
COPY package.json package-lock.json ./
|
||||
RUN npm ci --production=false
|
||||
|
||||
# Build stage
|
||||
FROM deps AS builder
|
||||
COPY . .
|
||||
RUN npm run build
|
||||
|
||||
# Runtime stage
|
||||
FROM node:20-alpine
|
||||
WORKDIR /app
|
||||
RUN addgroup -g 1001 -S appgroup && adduser -S appuser -u 1001
|
||||
COPY --from=builder /app/dist ./dist
|
||||
COPY --from=deps /app/node_modules ./node_modules
|
||||
COPY package.json ./
|
||||
USER appuser
|
||||
EXPOSE 3000
|
||||
CMD ["node", "dist/index.js"]
|
||||
```
|
||||
|
||||
### Pattern 3: Python
|
||||
|
||||
```dockerfile
|
||||
# Build stage
|
||||
FROM python:3.12-slim AS builder
|
||||
WORKDIR /app
|
||||
COPY requirements.txt .
|
||||
RUN pip install --no-cache-dir --prefix=/install -r requirements.txt
|
||||
|
||||
# Runtime stage
|
||||
FROM python:3.12-slim
|
||||
WORKDIR /app
|
||||
RUN groupadd -r appgroup && useradd -r -g appgroup appuser
|
||||
COPY --from=builder /install /usr/local
|
||||
COPY . .
|
||||
USER appuser
|
||||
EXPOSE 8000
|
||||
CMD ["python", "-m", "uvicorn", "main:app", "--host", "0.0.0.0", "--port", "8000"]
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## Base Image Decision Tree
|
||||
|
||||
```
|
||||
Is it a compiled binary (Go, Rust, C)?
|
||||
├── Yes → distroless/static or scratch
|
||||
└── No
|
||||
├── Need a shell for debugging?
|
||||
│ ├── Yes → alpine variant (e.g., node:20-alpine)
|
||||
│ └── No → distroless variant
|
||||
├── Need glibc (not musl)?
|
||||
│ ├── Yes → slim variant (e.g., python:3.12-slim)
|
||||
│ └── No → alpine variant
|
||||
└── Need specific OS packages?
|
||||
├── Many → debian-slim
|
||||
└── Few → alpine + apk add
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## Proactive Triggers
|
||||
|
||||
Flag these without being asked:
|
||||
|
||||
- **Dockerfile uses :latest** → Suggest pinning to a specific version tag.
|
||||
- **No .dockerignore** → Create one. At minimum: `.git`, `node_modules`, `__pycache__`, `.env`.
|
||||
- **COPY . . before dependency install** → Cache bust. Reorder to install deps first.
|
||||
- **Running as root** → Add USER instruction. No exceptions for production.
|
||||
- **Secrets in ENV or ARG** → Use BuildKit secret mounts. Never bake secrets into layers.
|
||||
- **Image over 1GB** → Multi-stage build required. No reason for a production image this large.
|
||||
- **No healthcheck** → Add one. Orchestrators (Compose, K8s) need it for proper lifecycle management.
|
||||
- **apt-get without cleanup in same layer** → `rm -rf /var/lib/apt/lists/*` in the same RUN.
|
||||
|
||||
---
|
||||
|
||||
## Installation
|
||||
|
||||
### One-liner (any tool)
|
||||
```bash
|
||||
git clone https://github.com/alirezarezvani/claude-skills.git
|
||||
cp -r claude-skills/engineering/docker-development ~/.claude/skills/
|
||||
```
|
||||
|
||||
### Multi-tool install
|
||||
```bash
|
||||
./scripts/convert.sh --skill docker-development --tool codex|gemini|cursor|windsurf|openclaw
|
||||
```
|
||||
|
||||
### OpenClaw
|
||||
```bash
|
||||
clawhub install cs-docker-development
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## Related Skills
|
||||
|
||||
- **senior-devops** — Broader DevOps scope (CI/CD, IaC, monitoring). Complementary — use docker-development for container-specific work, senior-devops for pipeline and infrastructure.
|
||||
- **senior-security** — Application security. Complementary — docker-development covers container security, senior-security covers application-level threats.
|
||||
- **autoresearch-agent** — Can optimize Docker build times or image sizes as measurable experiments.
|
||||
- **ci-cd-pipeline-builder** — Pipeline construction. Complementary — docker-development builds the containers, ci-cd-pipeline-builder deploys them.
|
||||
Reference in New Issue
Block a user