🎯

ln-733-env-configurator

🎯Skill

from levnikolaevich/claude-code-skills

VibeIndex|
What it does

Generates environment configuration files with automatic variable discovery, classification, and secrets protection for development and production environments.

πŸ“¦

Part of

levnikolaevich/claude-code-skills(85 items)

ln-733-env-configurator

Installation

Claude CodeAdd plugin in Claude Code
/plugin add levnikolaevich/claude-code-skills
git cloneClone repository
git clone https://github.com/levnikolaevich/claude-code-skills.git ~/.claude/skills
πŸ“– Extracted from docs: levnikolaevich/claude-code-skills
13Installs
-
AddedFeb 4, 2026

Skill Details

SKILL.md

Configures environment variables and secrets protection

Overview

# ln-733-env-configurator

Type: L3 Worker

Category: 7XX Project Bootstrap

Parent: ln-730-devops-setup

Configures environment variables for development and production environments.

---

Purpose & Scope

Creates environment configuration files:

  • Does: Generate .env files, update .gitignore for secrets protection
  • Does NOT: Store secrets, manage external secrets managers, configure CI/CD secrets

---

Inputs

| Input | Source | Description |

|-------|--------|-------------|

| Project Name | Directory name | Used for database/service naming |

| Backend Port | Stack-dependent | 5000 (.NET), 8000 (Python) |

| Frontend Port | Default | 3000 |

| Database Port | Default | 5432 |

| Detected Vars | Code analysis | Environment variables found in code |

---

Outputs

| File | Purpose | Template |

|------|---------|----------|

| .env.example | Documented template | [env_example.template](references/env_example.template) |

| .env.development | Local development defaults | [env_development.template](references/env_development.template) |

| .env.production | Production placeholders | [env_production.template](references/env_production.template) |

| .gitignore (append) | Secrets protection | [gitignore_secrets.template](references/gitignore_secrets.template) |

---

Workflow

Phase 1: Environment Discovery

Scan project for existing environment usage:

  • Check for existing .env files
  • Search code for process.env, os.environ, Configuration[]
  • Identify which variables are secrets vs configuration

Output: List of required environment variables with types

Phase 2: Variable Classification

Classify discovered variables:

| Category | Examples | Treatment |

|----------|----------|-----------|

| Database | DATABASE_URL, POSTGRES_* | Auto-generate with project name |

| API Config | API_PORT, LOG_LEVEL | Use detected or defaults |

| Security | JWT_SECRET, API_KEY | Placeholder with warning |

| External | REDIS_URL, SMTP_* | Comment out as optional |

Phase 3: Template Generation

Generate environment files from templates:

  1. Apply variable substitution
  2. Include all discovered variables
  3. Add comments for undocumented variables

Phase 4: Gitignore Update

Append secrets protection to .gitignore:

  1. Read existing .gitignore (if exists)
  2. Check if secrets patterns already present
  3. Append missing patterns from template
  4. Preserve existing entries

---

Generated File Structure

.env.example

Documented template with all variables:

  • Section headers (Database, Backend, Frontend, Security, External)
  • Descriptive comments for each variable
  • Safe placeholder values (never real secrets)
  • Optional variables commented out

.env.development

Ready-to-use development configuration:

  • Pre-filled values that work with docker-compose
  • Development-only secrets (clearly marked)
  • Debug-level logging enabled

.env.production

Production placeholder file:

  • ${VARIABLE} syntax for deployment substitution
  • Comments indicating required secrets
  • Production-appropriate defaults (Warning log level)

---

Security Best Practices

| Practice | Implementation |

|----------|----------------|

| No real secrets | Placeholder values only in templates |

| Gitignore protection | All .env files except .env.example |

| Development warnings | Mark dev secrets as insecure |

| Production guidance | Comments about secrets manager usage |

| Key rotation reminder | Note about regular secret rotation |

---

Security Notes

Generated files include these security reminders:

  1. Never commit real secrets - .gitignore prevents accidental commits
  2. Use secrets manager - GitHub Secrets, AWS Secrets Manager for production
  3. Rotate secrets regularly - Especially JWT secrets
  4. Strong JWT secrets - Minimum 256 bits (32 bytes)
  5. Restrict CORS - Only allow necessary origins in production

---

Quality Criteria

Generated files must:

  • [ ] .env.example contains all required variables
  • [ ] No real secrets or passwords in any file
  • [ ] .gitignore updated with secrets patterns
  • [ ] .env.development works with docker-compose
  • [ ] .env.production uses placeholder syntax

---

Critical Notes

  1. Template-based: Use templates from references/. Do NOT hardcode file contents.
  2. Idempotent: Check file existence. Append to .gitignore, don't overwrite.
  3. No Real Secrets: Never generate files with actual passwords or API keys.
  4. Development Safety: Development defaults should work out-of-box with docker-compose.

---

Reference Files

| File | Purpose |

|------|---------|

| [env_example.template](references/env_example.template) | Documented .env template |

| [env_development.template](references/env_development.template) | Development defaults |

| [env_production.template](references/env_production.template) | Production placeholders |

| [gitignore_secrets.template](references/gitignore_secrets.template) | .gitignore additions |

---

Version: 1.1.0

Last Updated: 2026-01-10

More from this repository10

πŸͺ
levnikolaevich-claude-code-skillsπŸͺMarketplace

Official marketplace for Agile Linear Workflow plugin - complete end-to-end automation for software development teams using Linear. Includes 7XX Project Bootstrap series for technology-agnostic project migration.

🎯
ln-140-test-docs-creator🎯Skill

Generates comprehensive test documentation with testing strategy and test organization structure for software projects.

🎯
ln-110-project-docs-coordinator🎯Skill

Coordinates project documentation by gathering context once, detecting project type, and delegating document creation to 5 specialized workers.

🎯
ln-114-frontend-docs-creator🎯Skill

Generates design guidelines documentation for frontend projects with WCAG 2.1 compliance when a frontend framework is detected.

🎯
ln-113-backend-docs-creator🎯Skill

Generates backend documentation files (API spec and database schema) automatically when backend or database technologies are detected in a project.

🎯
ln-610-code-comments-auditor🎯Skill

Audits code comments and docstrings across 6 quality categories, generating a comprehensive compliance score and actionable recommendations for improvement.

🎯
ln-115-devops-docs-creator🎯Skill

Generates a comprehensive runbook.md for DevOps setup, dynamically tailored to project's Docker configuration and deployment specifics.

🎯
ln-772-error-handler-setup🎯Skill

Configures global exception handling middleware for .NET and Python backend applications with standardized error responses.

🎯
ln-120-reference-docs-creator🎯Skill

Generates reference documentation structure and smart documents for project tech stack, creating only justified architectural decision records and guides.

🎯
ln-625-dependencies-auditor🎯Skill

Audits dependencies for outdated packages, unused imports, unnecessary libraries, and custom implementations, providing actionable recommendations.