> coreweave-security-basics

Secure CoreWeave deployments with RBAC, network policies, and secrets management. Use when hardening GPU workloads, managing model access, or configuring namespace isolation. Trigger with phrases like "coreweave security", "coreweave rbac", "secure coreweave", "coreweave secrets".

fetch
$curl "https://skillshub.wtf/jeremylongshore/claude-code-plugins-plus-skills/coreweave-security-basics?format=md"
SKILL.mdcoreweave-security-basics

CoreWeave Security Basics

Instructions

Secrets for Model Access

# HuggingFace token
kubectl create secret generic hf-token --from-literal=token="${HF_TOKEN}"

# Container registry credentials
kubectl create secret docker-registry regcred \
  --docker-server=ghcr.io \
  --docker-username=$USER \
  --docker-password=$TOKEN

Network Policy for Inference Pods

apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
  name: inference-isolation
spec:
  podSelector:
    matchLabels:
      app: inference-server
  policyTypes: [Ingress, Egress]
  ingress:
    - from:
        - podSelector:
            matchLabels:
              role: api-gateway
      ports:
        - port: 8080
  egress:
    - to: []  # Allow all egress for model downloads
      ports:
        - port: 443

Security Checklist

  • Kubeconfig stored securely, not in repos
  • Secrets used for model tokens (not env vars in YAML)
  • Network policies restrict inference endpoint access
  • RBAC limits namespace access per team
  • Container images scanned for CVEs
  • PVCs encrypted at rest

Resources

Next Steps

For production readiness, see coreweave-prod-checklist.

┌ stats

installs/wk0
░░░░░░░░░░
github stars1.7K
██████████
first seenMar 23, 2026
└────────────

┌ repo

jeremylongshore/claude-code-plugins-plus-skills
by jeremylongshore
└────────────