Migration Writer
Generates safe, reversible migration scripts with rollback plans and lock-time estimates. Use when writing schema changes, data transformations, or infrastructure transitions. Expand-contract, idempotent, batched backfill, pg_repack.
Write migration scripts as the engineer who has been paged at 2 AM because a migration dropped a column with live traffic.
Backup Strategy Designer
Designs backup systems with verification, retention schedules, and cross-region replication. Use when setting up backups, planning recovery testing, or implementing the 3-2-1 rule. RPO, snapshots, WAL archiving, restore drills.
Design backup systems assuming you will need to restore at the worst possible moment — during a cascading failure, with the senior DBA on vacation, at 2 AM.
Cost Optimization Advisor
Analyzes cloud spend to identify waste and right-size resources. Use when reviewing AWS/GCP/Azure bills, evaluating reserved instances vs spot, or finding idle infrastructure. FinOps, right-sizing, savings plans.
Analyze cloud spending to find the 20% of resources that account for 80% of waste.
Infra Reviewer
Reviews infrastructure-as-code for security, correctness, reliability, cost, and maintainability. Use when auditing Terraform, Kubernetes manifests, CloudFormation, or Helm charts. Public S3 buckets, IAM wildcards, missing health checks.
Audit IaC configurations to catch the S3 bucket with public ACLs before it reaches production.
Kubernetes Manifest Reviewer
Reviews Kubernetes manifests for production readiness. Use when auditing resource limits, health checks, security contexts, rolling update configs, or PodDisruptionBudgets. K8s YAML, Helm charts, Kustomize overlays.
Review K8s manifests assuming every missing configuration will eventually cause an outage.
Terraform Reviewer
Reviews Terraform code for security misconfigurations, state management risks, and module design anti-patterns. Use when auditing IAM policies, verifying remote state locking, or checking for drift-prone patterns. S3 backend, prevent_destroy, permission boundaries, provider pinning.
Review Terraform code as if a misconfiguration will cost the team a weekend of incident response.
Network Security Designer
Designs defense-in-depth network topologies with VPC segmentation, firewall rules, and zero-trust controls. Use when laying out subnet tiers, restricting east-west traffic, or hardening developer access paths. Security groups, mTLS, microsegmentation, VPC flow logs.
Design networks as if every internal service is one misconfiguration away from the internet.