vercel-deploy
Vercel Deployment Skill
Deploy applications and websites to Vercel with automatic framework detection.
When to use me
Use this skill when:
- Deploying a web application to production
- Setting up staging/preview deployments
- Migrating from another hosting service
- Testing deployment configuration
What I do
- Detect framework from project structure (Next.js, Vite, Astro, etc.)
- Validate deployment configuration
- Generate deployment commands
- Provide deployment URLs and settings
- Handle environment variables and build settings
Examples
# Deploy current directory to Vercel
agent: Deploy this application to Vercel
# Deploy with specific settings
agent: Deploy to Vercel with production environment variables
# Check deployment configuration
agent: Check if this project is ready for Vercel deployment
Output format
## Vercel Deployment
**Project Detected:** Next.js 14 (App Router)
**Framework:** @vercel/nextjs
**Deployment Configuration:**
- Build Command: npm run build
- Output Directory: .next
- Node Version: 18.x
**Deployment Commands:**
```bash
# Install Vercel CLI
npm i -g vercel
# Deploy
vercel --prod
Environment Variables Required:
- DATABASE_URL
- API_KEY
Next Steps:
- Set environment variables in Vercel dashboard
- Run deployment command
- Access deployment at: https://project-name.vercel.app
## Notes
- Requires Vercel CLI or GitHub integration
- Supports automatic framework detection for 40+ frameworks
- Handles both static sites and server-side applications
- Provides claimable deployments for ownership transfer
More from wojons/skills
adversarial-thinking
Apply systematic adversarial thinking patterns including devil's advocate, assumption busting, red teaming, and white hat security approaches
45devils-advocate
Challenge ideas, assumptions, and decisions by playing devil's advocate to identify weaknesses and prevent groupthink
41redteam
Think and act like an attacker to identify security vulnerabilities, weaknesses, and penetration vectors through adversarial security testing
37code-migration
Guide framework and library migrations with incremental strategies, breaking change analysis, compatibility testing, and automated migration tools
34observability-logging
Use logs as part of comprehensive observability strategy including metrics, traces, alerts, and dashboards for system understanding and operational excellence
34white-hat
Build defensive security capabilities, implement security by design, and practice ethical hacking to protect systems proactively
34