Google Cloud
Deploy, monitor, and manage GCP services with battle-tested patterns.
MIT-0 · Free to use, modify, and redistribute. No attribution required.
⭐ 4 · 1.8k · 9 current installs · 9 all-time installs
byIván@ivangdavila
MIT-0
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (manage GCP) align with the declared requirement of the gcloud binary. No unrelated binaries, env vars, or config paths are requested.
Instruction Scope
SKILL.md is a static set of guidance/rules and does not instruct the agent to read arbitrary files, exfiltrate data, call unexpected endpoints, or run specific risky commands. It stays within the stated scope of GCP operational best practices.
Install Mechanism
There is no install spec and no code files; this is instruction-only, so nothing will be downloaded or written to disk by the skill itself.
Credentials
The skill declares no required env vars or credentials, which fits a documentation-style skill. However, it depends on the gcloud CLI being present and usable — that CLI uses local credentials (gcloud auth, ADC via GOOGLE_APPLICATION_CREDENTIALS, or service account keys). If the agent is allowed to invoke the CLI, it could act using whatever GCP credentials are already available in the environment, so you should ensure those credentials are scoped appropriately.
Persistence & Privilege
The skill does not request always:true, does not install persistent components, and does not attempt to modify other skills or system-wide settings. Autonomous invocation is allowed by default but not in itself a problem here.
Assessment
This skill is a documentation-only set of GCP best practices and is internally consistent with its purpose. Before enabling or allowing autonomous use, verify the environment's gcloud authentication: the skill expects the gcloud CLI to be present and would operate using any GCP credentials already available (gcloud auth, ADC, or service account keys). If you want to limit risk, run the agent with a low-privilege GCP account or in a sandbox, confirm there are no unwanted service account keys in your environment, and prefer short-lived, least-privilege credentials (Workload Identity / limited service accounts). Also note the skill has no identifiable homepage or publisher info beyond an owner ID — if provenance matters to you, seek a published source or vendor before using in production.Like a lobster shell, security has layers — review code before you run it.
Current versionv1.0.0
Download ziplatest
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🌐 Clawdis
OSLinux · macOS · Windows
Any bingcloud
SKILL.md
Google Cloud Production Rules
Cost Traps
- Stopped Compute Engine VMs still pay for persistent disks and static IPs — delete disks or use snapshots for long-term storage
- Cloud NAT charges per VM and per GB processed — use Private Google Access for GCP API traffic instead
- BigQuery on-demand pricing charges for bytes scanned, not rows returned — partition tables and use
LIMITin dev, butLIMITdoesn't reduce scan cost in prod - Preemptible VMs save 80% but can be terminated anytime — only for fault-tolerant batch workloads
- Egress to internet costs, egress to same region is free — keep resources in same region, use Cloud CDN for global distribution
Security Rules
- Service accounts are both identity and resource — one service account can impersonate another with
roles/iam.serviceAccountTokenCreator - IAM policy inheritance: Organization → Folder → Project → Resource — deny policies at org level override allows below
- VPC Service Controls protect against data exfiltration — but break Cloud Console access if not configured with access levels
- Default Compute Engine service account has Editor role — create dedicated service accounts with least privilege
- Workload Identity Federation eliminates service account keys — use for GitHub Actions, GitLab CI, external workloads
Networking
- VPC is global, subnets are regional — unlike AWS, single VPC can span all regions
- Firewall rules are allow-only by default — implicit deny all ingress, allow all egress. Add explicit deny rules for egress control
- Private Google Access is per-subnet setting — enable on every subnet that needs to reach GCP APIs without public IP
- Cloud Load Balancer global vs regional — global for multi-region, but regional is simpler and cheaper for single region
- Shared VPC separates network admin from project admin — host project owns network, service projects consume it
Performance
- Cloud Functions gen1 has 9-minute timeout — gen2 (Cloud Run based) allows 60 minutes
- Cloud SQL connection limits vary by instance size — use connection pooling or Cloud SQL Auth Proxy
- Firestore/Datastore hotspotting on sequential IDs — use UUIDs or reverse timestamps for document IDs
- GKE Autopilot simplifies but limits — no DaemonSets, no privileged containers, no host network
- Cloud Storage single object limit is 5TB — use compose for larger, parallel uploads for faster
Monitoring
- Cloud Logging retention: 30 days default, _Required bucket is 400 days — create custom bucket with longer retention for compliance
- Cloud Monitoring alert policies have 24-hour auto-close — incident disappears even if issue persists, configure notification channels for re-alert
- Error Reporting groups by stack trace — same error with different messages creates duplicates
- Cloud Trace sampling is automatic — may miss rare errors, increase sampling rate for debugging
- Audit logs: Admin Activity always on, Data Access off by default — enable Data Access logs for security compliance
Infrastructure as Code
- Terraform google provider requires project ID everywhere — use
google_projectdata source or variables, never hardcode gcloudcommands are imperative — use Deployment Manager or Terraform for reproducible infra- Cloud Build triggers on push but IAM permissions on first run confusing — grant Cloud Build service account necessary roles before first deploy
- Project deletion has 30-day recovery period — but project ID is globally unique forever, can't reuse
- Labels propagate to billing — use consistent labeling for cost allocation:
env,team,service
IAM Best Practices
- Primitive roles (Owner/Editor/Viewer) are too broad — use predefined roles, create custom for least privilege
- Service account keys are security liability — use Workload Identity, impersonation, or attached service accounts instead
roles/iam.serviceAccountUserlets you run as that SA — equivalent to having its permissions, grant carefully- Organization policies restrict what projects can do —
constraints/compute.vmExternalIpAccessblocks public VMs org-wide
Files
1 totalSelect a file
Select a file to preview.
Comments
Loading comments…
