Skip to content

Add Vault product with 6 plugins and 16 skills#22

Open
MrFixit96 wants to merge 5 commits intohashicorp:mainfrom
MrFixit96:add-vault-skills
Open

Add Vault product with 6 plugins and 16 skills#22
MrFixit96 wants to merge 5 commits intohashicorp:mainfrom
MrFixit96:add-vault-skills

Conversation

@MrFixit96
Copy link
Copy Markdown

@MrFixit96 MrFixit96 commented Feb 3, 2026

Summary

Add Vault as the third product after Terraform and Packer with job-oriented plugin naming and decision framework-driven skills.

Design Approach

This PR encodes "tacit knowledge" and reduces the "3-4 documentation hops" users typically need by:

  1. Job-oriented plugin names — named for what users are trying to accomplish (matching Terraform/Packer patterns)
  2. "What Are You Trying to Solve?" decision frameworks — every skill starts by routing users to the right solution
  3. Mental model sections — explaining how each component works before diving into reference material

Structure

vault/
├── README.md
├── credential-generation/
│   ├── .claude-plugin/plugin.json
│   ├── SPEC.md
│   └── skills/
│       ├── secrets-engines/
│       │   ├── SKILL.md
│       │   └── references/secrets-engines.md
│       └── vault-agent/
│           ├── SKILL.md
│           └── references/vault-agent.md
├── app-access/
│   ├── .claude-plugin/plugin.json
│   ├── SPEC.md
│   └── skills/
│       ├── auth-methods/
│       │   ├── SKILL.md
│       │   └── references/auth-methods.md
│       ├── policies/
│       │   ├── SKILL.md
│       │   └── references/policies.md
│       ├── token-management/
│       │   ├── SKILL.md
│       │   └── references/token-management.md
│       ├── identity-system/
│       │   ├── SKILL.md
│       │   └── references/identity-system.md
│       └── response-wrapping/
│           ├── SKILL.md
│           └── references/response-wrapping.md
├── deployment/
│   ├── .claude-plugin/plugin.json
│   ├── SPEC.md
│   └── skills/
│       ├── kubernetes-integration/
│       │   ├── SKILL.md
│       │   └── references/kubernetes.md
│       ├── production-operations/
│       │   ├── SKILL.md
│       │   └── references/
│       │       ├── production-operations.md
│       │       └── enterprise.md
│       └── troubleshooting/
│           ├── SKILL.md
│           └── references/troubleshooting.md
├── multi-tenancy/
│   ├── .claude-plugin/plugin.json
│   ├── SPEC.md
│   └── skills/
│       └── enterprise-features/
│           ├── SKILL.md
│           └── references/enterprise.md
├── ai-workflows/
│   ├── .claude-plugin/plugin.json
│   ├── SPEC.md
│   └── skills/
│       ├── vault-mcp-server/
│       │   ├── SKILL.md
│       │   └── references/vault-mcp-server.md
│       └── mcp-secrets-workflows/
│           ├── SKILL.md
│           └── references/mcp-secrets-workflows.md
└── hashicorp-secrets-engines/
    ├── .claude-plugin/plugin.json
    ├── SPEC.md
    └── skills/
        ├── consul-secrets/
        │   ├── SKILL.md
        │   └── references/consul-secrets.md
        ├── nomad-secrets/
        │   ├── SKILL.md
        │   └── references/nomad-secrets.md
        └── terraform-cloud-secrets/
            ├── SKILL.md
            └── references/terraform-cloud-secrets.md

Plugins (6)

All plugins are v0.2.0, named for the job the user is trying to accomplish:

Plugin Name Directory User Intent Skills
vault-credential-generation vault/credential-generation "Generate credentials for my app" secrets-engines, vault-agent
vault-app-access vault/app-access "Give my app access to Vault" auth-methods, policies, token-management, identity-system, response-wrapping
vault-deployment vault/deployment "Deploy and operate Vault" kubernetes-integration, production-operations, troubleshooting
vault-multi-tenancy vault/multi-tenancy "Set up multi-tenant Vault" enterprise-features
vault-ai-workflows vault/ai-workflows "Let AI manage my secrets" vault-mcp-server, mcp-secrets-workflows
vault-hashicorp-secrets-engines vault/hashicorp-secrets-engines "Generate tokens for HashiCorp products" consul-secrets, nomad-secrets, terraform-cloud-secrets

Skills (16)

Plugin Skill Description
credential-generation secrets-engines KV secrets, database dynamic credentials, AWS/Azure/GCP credentials, Transit encryption, PKI certificates, SSH, TOTP
credential-generation vault-agent Auto-auth, caching, secret file templating, sidecar patterns
app-access auth-methods AppRole, Kubernetes, OIDC/JWT, AWS IAM, Azure, GCP, LDAP, GitHub auth
app-access policies ACL policies, capabilities, templated policies, path patterns, Sentinel (Enterprise)
app-access token-management Token types, periodic/batch tokens, accessors, orphan tokens, lifecycle
app-access identity-system Entities, aliases, groups, identity tokens, OIDC provider
app-access response-wrapping Cubbyhole secrets, secure distribution, wrapped tokens, bootstrap workflows
deployment kubernetes-integration Vault Secrets Operator (VSO), Agent Injector, CSI Provider, Kubernetes auth
deployment production-operations HA architecture, Integrated Storage (Raft), auto-unseal, DR replication, monitoring, backup/recovery
deployment troubleshooting Sealed Vault, permission denied, token expired, performance, audit log analysis
multi-tenancy enterprise-features Namespaces, Performance/DR replication, Sentinel, MFA, Control Groups, HSM
ai-workflows vault-mcp-server Install and configure Vault MCP Server for AI-assisted secrets management
ai-workflows mcp-secrets-workflows Managing secrets with Claude, KV mounts via MCP, automating Vault operations
hashicorp-secrets-engines consul-secrets Dynamic Consul ACL tokens through Vault
hashicorp-secrets-engines nomad-secrets Dynamic Nomad ACL tokens through Vault
hashicorp-secrets-engines terraform-cloud-secrets Dynamic Terraform Cloud/Enterprise API tokens through Vault

Skill Decision Framework Pattern

Every skill starts with a decision framework that routes users to the right solution:

## What Are You Trying to Solve?

### "I need my CI/CD pipeline to access Vault"
→ Use **AppRole** with response wrapping. [Jump to AppRole](#approle)

### "I need my Kubernetes pods to get secrets"
→ Use **Kubernetes auth**. [Jump to Kubernetes](#kubernetes)

Followed by:

  • "How X Works" mental model section
  • Decision tables mapping problems to solutions
  • Detailed reference material

Changes Summary

  • 49 files changed (46 added, 3 modified)
  • 6 plugin directories with plugin.json (v0.2.0) and SPEC.md
  • 16 SKILL.md files with decision frameworks
  • 17 reference documents
  • vault/README.md with installation instructions
  • Updated: .claude-plugin/marketplace.json, CHANGELOG.md, README.md

Repository Totals After Merge

  • 11 plugins (terraform: 3, packer: 2, vault: 6)
  • 29 skills (terraform: 9, packer: 4, vault: 16)

@MrFixit96 MrFixit96 requested a review from a team as a code owner February 3, 2026 06:54
@hashicorp-cla-app
Copy link
Copy Markdown

hashicorp-cla-app Bot commented Feb 3, 2026

CLA assistant check
All committers have signed the CLA.

@MrFixit96 MrFixit96 force-pushed the add-vault-skills branch 4 times, most recently from 8047f56 to 3f3d444 Compare February 3, 2026 07:11
MrFixit96 added a commit to MrFixit96/agent-skills that referenced this pull request Feb 4, 2026
…n frameworks

BREAKING CHANGE: Vault plugin names changed to match Terraform/Packer naming pattern

Plugin renames:
- vault-secrets-management -> vault-credential-generation
- vault-authentication -> vault-app-access
- vault-operations -> vault-deployment
- vault-enterprise -> vault-multi-tenancy
- vault-mcp-integration -> vault-ai-workflows
- vault-hashicorp-integrations -> vault-hashicorp-secrets-engines

Skill transformations:
- All 16 skills now lead with 'What Are You Trying to Solve?' decision frameworks
- Added mental model sections explaining how each component works
- Added decision tables mapping user problems to solutions
- Reorganized content to prioritize job-to-be-done over feature descriptions

This addresses feedback from PR hashicorp#22 about encoding tacit knowledge and
reducing the 3-4 documentation hops users typically need.
@gautambaghel
Copy link
Copy Markdown
Member

@MrFixit96 - Thanks for the PR, will merge this week after getting the Tessl pipeline setup for feedback

Do you mind fixing the CI that's failing? it seems the repo structure has issues

MrFixit96 added a commit to MrFixit96/agent-skills that referenced this pull request Feb 13, 2026
…n frameworks

BREAKING CHANGE: Vault plugin names changed to match Terraform/Packer naming pattern

Plugin renames:
- vault-secrets-management -> vault-credential-generation
- vault-authentication -> vault-app-access
- vault-operations -> vault-deployment
- vault-enterprise -> vault-multi-tenancy
- vault-mcp-integration -> vault-ai-workflows
- vault-hashicorp-integrations -> vault-hashicorp-secrets-engines

Skill transformations:
- All 16 skills now lead with 'What Are You Trying to Solve?' decision frameworks
- Added mental model sections explaining how each component works
- Added decision tables mapping user problems to solutions
- Reorganized content to prioritize job-to-be-done over feature descriptions

This addresses feedback from PR hashicorp#22 about encoding tacit knowledge and
reducing the 3-4 documentation hops users typically need.
MrFixit96 added a commit to MrFixit96/agent-skills that referenced this pull request Mar 31, 2026
…n frameworks

BREAKING CHANGE: Vault plugin names changed to match Terraform/Packer naming pattern

Plugin renames:
- vault-secrets-management -> vault-credential-generation
- vault-authentication -> vault-app-access
- vault-operations -> vault-deployment
- vault-enterprise -> vault-multi-tenancy
- vault-mcp-integration -> vault-ai-workflows
- vault-hashicorp-integrations -> vault-hashicorp-secrets-engines

Skill transformations:
- All 16 skills now lead with 'What Are You Trying to Solve?' decision frameworks
- Added mental model sections explaining how each component works
- Added decision tables mapping user problems to solutions
- Reorganized content to prioritize job-to-be-done over feature descriptions

This addresses feedback from PR hashicorp#22 about encoding tacit knowledge and
reducing the 3-4 documentation hops users typically need.
@MrFixit96
Copy link
Copy Markdown
Author

CI failure analysis summary for run https://github.com/hashicorp/agent-skills/actions/runs/23818076999/job/69422941930?pr=22

Root cause: this is a workflow script bug in .github/workflows/tessl-skill-review.yml, not a SKILL.md validation/content failure.

What happened:

  • Tessl successfully reviewed the first changed skill (overallPassed: true, reviewScore: 74).
  • The job then crashed with exit code 127:
    /home/runner/work/_temp/...sh: line 99: vault/ai-workflows/skills/mcp-secrets-workflows\: No such file or directory

Why it failed:

  • In Run skill reviews, the table row is built with backticks:
    TABLE="${TABLE}\\n| \\${DIR_DISPLAY}\ | ..."
  • Bash treats backticks as command substitution, so it attempts to execute the skill path as a command.

Suggested fix:

  • Replace backtick-based formatting with a safe representation (for example <code>${DIR_DISPLAY}</code>), or build rows with printf to avoid command substitution.

Note: same failure signature appears in earlier failed Tessl runs, so this looks systemic to the workflow script.

Copy link
Copy Markdown
Member

@gautambaghel gautambaghel left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@MrFixit96 some minor changes requested

Comment thread README.md Outdated
Comment thread README.md Outdated
@gautambaghel gautambaghel self-requested a review April 1, 2026 17:58
Add comprehensive Vault skills for secrets management, authentication,
operations, enterprise features, MCP integration, and HashiCorp product
integrations.

- **vault-authentication** (5 skills)
  - auth-methods: AppRole, Kubernetes, OIDC, AWS/Azure/GCP auth
  - policies: HCL policy syntax, capabilities, templating
  - token-management: Service/batch/periodic tokens, accessors
  - identity-system: Entities, aliases, groups, OIDC provider
  - response-wrapping: Cubbyhole, wrap/unwrap, malfeasance detection

- **vault-secrets-management** (2 skills)
  - secrets-engines: KV, database, PKI, transit, SSH, cloud engines
  - vault-agent: Auto-auth, templating, caching, process supervisor

- **vault-operations** (3 skills)
  - kubernetes-integration: Injector, CSI provider, Helm deployment
  - production-operations: HA, performance tuning, backup/restore
  - troubleshooting: Diagnostics, audit analysis, common errors

- **vault-enterprise** (1 skill)
  - enterprise-features: Namespaces, replication, Sentinel, MFA, HSM

- **vault-mcp-integration** (2 skills)
  - vault-mcp-server: MCP server setup, tool configuration
  - mcp-secrets-workflows: AI-assisted secret management patterns

- **vault-hashicorp-integrations** (3 skills)
  - consul-secrets: Dynamic Consul ACL tokens
  - nomad-secrets: Dynamic Nomad ACL tokens
  - terraform-cloud-secrets: Dynamic TFC API tokens

All skills follow Anthropic Agent Skills best practices:
- Descriptions include 'Use when' trigger phrases
- Reference files use 'For X, see' linking for in-time revelation
- Skills under 8KB for efficient context loading
- Consistent frontmatter with name and description fields

Content sourced from official HashiCorp Vault documentation.
HVD-unique content excluded per content attribution analysis.

Repository totals: 11 plugins, 29 skills (terraform: 3/9, packer: 2/4, vault: 6/16)
…n frameworks

BREAKING CHANGE: Vault plugin names changed to match Terraform/Packer naming pattern

Plugin renames:
- vault-secrets-management -> vault-credential-generation
- vault-authentication -> vault-app-access
- vault-operations -> vault-deployment
- vault-enterprise -> vault-multi-tenancy
- vault-mcp-integration -> vault-ai-workflows
- vault-hashicorp-integrations -> vault-hashicorp-secrets-engines

Skill transformations:
- All 16 skills now lead with 'What Are You Trying to Solve?' decision frameworks
- Added mental model sections explaining how each component works
- Added decision tables mapping user problems to solutions
- Reorganized content to prioritize job-to-be-done over feature descriptions

This addresses feedback from PR hashicorp#22 about encoding tacit knowledge and
reducing the 3-4 documentation hops users typically need.
- Reduce SKILL.md verbosity and move deep detail to references

- Focus on compact workflow patterns and explicit tool map

- Add concrete destructive-operation safety checklist

- Strengthen actionable output expectations
Removed Contributing.md reference as requested
Removed examples directory mention from README as per comment.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants