diff --git a/.claude-plugin/plugin.json b/.claude-plugin/plugin.json index e0b6bdbd..05270b77 100644 --- a/.claude-plugin/plugin.json +++ b/.claude-plugin/plugin.json @@ -1,7 +1,7 @@ { "name": "antigravity-awesome-skills", "version": "9.7.0", - "description": "Plugin-safe Claude Code distribution of Antigravity Awesome Skills with 1,359 supported skills.", + "description": "Plugin-safe Claude Code distribution of Antigravity Awesome Skills with 1,360 supported skills.", "author": { "name": "sickn33 and contributors", "url": "https://github.com/sickn33/antigravity-awesome-skills" diff --git a/CATALOG.md b/CATALOG.md index 6ab567ed..d67c7101 100644 --- a/CATALOG.md +++ b/CATALOG.md @@ -2,7 +2,7 @@ Generated at: 2026-02-08T00:00:00.000Z -Total skills: 1373 +Total skills: 1374 ## architecture (88) @@ -628,7 +628,7 @@ Total skills: 1373 | `zod-validation-expert` | Expert in Zod β€” TypeScript-first schema validation. Covers parsing, custom errors, refinements, type inference, and integration with React Hook Form, Next.js... | zod, validation | zod, validation, typescript, first, schema, covers, parsing, custom, errors, refinements, type, inference | | `zustand-store-ts` | Create Zustand stores following established patterns with proper TypeScript types and middleware. | zustand, store, ts | zustand, store, ts, stores, following, established, proper, typescript, types, middleware | -## general (345) +## general (346) | Skill | Description | Tags | Triggers | | --- | --- | --- | --- | @@ -885,6 +885,7 @@ Total skills: 1373 | `project-skill-audit` | Audit a project and recommend the highest-value skills to add or update. | skill, audit | skill, audit, recommend, highest, value, skills, add, update | | `prompt-engineer` | Transforms user prompts into optimized prompts using frameworks (RTF, RISEN, Chain of Thought, RODES, Chain of Density, RACE, RISE, STAR, SOAP, CLEAR, GROW) | prompt-engineering, optimization, frameworks, ai-enhancement | prompt-engineering, optimization, frameworks, ai-enhancement, prompt, engineer, transforms, user, prompts, optimized, rtf, risen | | `prompt-library` | A comprehensive collection of battle-tested prompts inspired by [awesome-chatgpt-prompts](https://github.com/f/awesome-chatgpt-prompts) and community best pr... | prompt, library | prompt, library, collection, battle, tested, prompts, inspired, awesome, chatgpt, https, github, com | +| `protect-mcp-governance` | Agent governance skill for MCP tool calls β€” Cedar policy authoring, shadow-to-enforce rollout, and Ed25519 receipt verification. | protect, mcp, governance | protect, mcp, governance, agent, skill, calls, cedar, policy, authoring, shadow, enforce, rollout | | `qiskit` | Qiskit is the world's most popular open-source quantum computing framework with 13M+ downloads. Build quantum circuits, optimize for hardware, execute on sim... | qiskit | qiskit, world, most, popular, open, source, quantum, computing, framework, 13m, downloads, circuits | | `quality-nonconformance` | Codified expertise for quality control, non-conformance investigation, root cause analysis, corrective action, and supplier quality management in regulated m... | quality, nonconformance | quality, nonconformance, codified, expertise, control, non, conformance, investigation, root, cause, analysis, corrective | | `readme` | You are an expert technical writer creating comprehensive project documentation. Your goal is to write a README.md that is absurdly thoroughβ€”the kind of docu... | readme | readme, technical, writer, creating, documentation, goal, write, md, absurdly, thorough, kind, wish | diff --git a/README.md b/README.md index f4f4c27b..8c05a28d 100644 --- a/README.md +++ b/README.md @@ -1,13 +1,13 @@ - -# 🌌 Antigravity Awesome Skills: 1,373+ Agentic Skills for Claude Code, Gemini CLI, Cursor, Copilot & More + +# 🌌 Antigravity Awesome Skills: 1,374+ Agentic Skills for Claude Code, Gemini CLI, Cursor, Copilot & More -> **Installable GitHub library of 1,373+ agentic skills for Claude Code, Cursor, Codex CLI, Gemini CLI, Antigravity, and other AI coding assistants.** +> **Installable GitHub library of 1,374+ agentic skills for Claude Code, Cursor, Codex CLI, Gemini CLI, Antigravity, and other AI coding assistants.** Antigravity Awesome Skills is an installable GitHub library and npm installer for reusable `SKILL.md` playbooks. It is designed for Claude Code, Cursor, Codex CLI, Gemini CLI, Antigravity, Kiro, OpenCode, GitHub Copilot, and other AI coding assistants that benefit from structured operating instructions. Instead of collecting one-off prompt snippets, this repository gives you a searchable, installable catalog of skills, bundles, workflows, plugin-safe distributions, and practical docs that help agents perform recurring tasks with better context, stronger constraints, and clearer outputs. You can use this repo to install a broad multi-tool skill library, start from role-based bundles, or jump into workflow-driven execution for planning, coding, debugging, testing, security review, infrastructure, product work, and growth tasks. The root README is intentionally a high-signal landing page: understand what the project is, install it quickly, choose the right tool path, and then follow deeper docs only when you need them. -**Start here:** [Star the repo](https://github.com/sickn33/antigravity-awesome-skills/stargazers) Β· [Install in 1 minute](#installation) Β· [Choose your tool](#choose-your-tool) Β· [Best skills by tool](#best-skills-by-tool) Β· [πŸ“š Browse 1,373+ Skills](#browse-1373-skills) Β· [Bundles](docs/users/bundles.md) Β· [Workflows](docs/users/workflows.md) Β· [Plugins for Claude Code and Codex](docs/users/plugins.md) +**Start here:** [Star the repo](https://github.com/sickn33/antigravity-awesome-skills/stargazers) Β· [Install in 1 minute](#installation) Β· [Choose your tool](#choose-your-tool) Β· [Best skills by tool](#best-skills-by-tool) Β· [πŸ“š Browse 1,374+ Skills](#browse-1374-skills) Β· [Bundles](docs/users/bundles.md) Β· [Workflows](docs/users/workflows.md) Β· [Plugins for Claude Code and Codex](docs/users/plugins.md) [![GitHub stars](https://img.shields.io/badge/⭐%2031%2C000%2B%20Stars-gold?style=for-the-badge)](https://github.com/sickn33/antigravity-awesome-skills/stargazers) [![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](LICENSE) @@ -28,7 +28,7 @@ You can use this repo to install a broad multi-tool skill library, start from ro - **Installable, not just inspirational**: use `npx antigravity-awesome-skills` to put skills where your tool expects them. - **Built for major agent workflows**: Claude Code, Cursor, Codex CLI, Gemini CLI, Antigravity, Kiro, OpenCode, Copilot, and more. -- **Broad coverage with real utility**: 1,373+ skills across development, testing, security, infrastructure, product, and marketing. +- **Broad coverage with real utility**: 1,374+ skills across development, testing, security, infrastructure, product, and marketing. - **Faster onboarding**: bundles and workflows reduce the time from "I found this repo" to "I used my first skill". - **Useful whether you want breadth or curation**: browse the full catalog, start with top bundles, or compare alternatives before installing. @@ -127,7 +127,7 @@ Start with [Bundles](docs/users/bundles.md) for role-based recommendations, [Wor ## Best Skills By Tool -If you want a faster answer than "browse all 1,373+ skills", start with a tool-specific guide: +If you want a faster answer than "browse all 1,374+ skills", start with a tool-specific guide: - **[Claude Code skills](docs/users/claude-code-skills.md)**: install paths, starter skills, prompt examples, and plugin marketplace flow. - **[Cursor skills](docs/users/cursor-skills.md)**: best starter skills for `.cursor/skills/`, UI-heavy work, and pair-programming flows. @@ -183,7 +183,7 @@ If Antigravity starts hitting context limits with too many active skills, the ac If you use OpenCode or another `.agents/skills` host, prefer a reduced install up front instead of copying the full library into a context-sensitive runtime. The installer now supports `--risk`, `--category`, and `--tags` so you can keep the installed set narrow. -## Browse 1,373+ Skills +## Browse 1,374+ Skills Use the root repo as a landing page, then jump into the deeper surface that matches your intent. @@ -527,6 +527,7 @@ We officially thank the following contributors for their help in making this rep - [@Al-Garadi](https://github.com/Al-Garadi) - [@olgasafonova](https://github.com/olgasafonova) - [@spideyashith](https://github.com/spideyashith) +- [@tomjwxf](https://github.com/tomjwxf) ## Star History diff --git a/apps/web-app/public/sitemap.xml b/apps/web-app/public/sitemap.xml index f29ebaee..bb607c54 100644 --- a/apps/web-app/public/sitemap.xml +++ b/apps/web-app/public/sitemap.xml @@ -12,6 +12,12 @@ weekly 0.7 + + http://localhost/skill/protect-mcp-governance + 2026-04-06 + weekly + 0.7 + http://localhost/skill/awareness-stage-mapper 2026-04-06 @@ -240,10 +246,4 @@ weekly 0.7 - - http://localhost/skill/adhx - 2026-04-06 - weekly - 0.7 - diff --git a/apps/web-app/public/skills.json.backup b/apps/web-app/public/skills.json.backup index eed68f59..b99fb087 100644 --- a/apps/web-app/public/skills.json.backup +++ b/apps/web-app/public/skills.json.backup @@ -21870,6 +21870,28 @@ "reasons": [] } }, + { + "id": "protect-mcp-governance", + "path": "skills/protect-mcp-governance", + "category": "uncategorized", + "name": "protect-mcp-governance", + "description": "Agent governance skill for MCP tool calls \u2014 Cedar policy authoring, shadow-to-enforce rollout, and Ed25519 receipt verification.", + "risk": "safe", + "source": "community", + "date_added": "2026-04-05", + "plugin": { + "targets": { + "codex": "supported", + "claude": "supported" + }, + "setup": { + "type": "none", + "summary": "", + "docs": null + }, + "reasons": [] + } + }, { "id": "protocol-reverse-engineering", "path": "skills/protocol-reverse-engineering", diff --git a/data/catalog.json b/data/catalog.json index 988e9392..32c9f658 100644 --- a/data/catalog.json +++ b/data/catalog.json @@ -1,6 +1,6 @@ { "generatedAt": "2026-02-08T00:00:00.000Z", - "total": 1373, + "total": 1374, "skills": [ { "id": "00-andruia-consultant", @@ -24375,6 +24375,32 @@ ], "path": "skills/prompt-library/SKILL.md" }, + { + "id": "protect-mcp-governance", + "name": "protect-mcp-governance", + "description": "Agent governance skill for MCP tool calls β€” Cedar policy authoring, shadow-to-enforce rollout, and Ed25519 receipt verification.", + "category": "general", + "tags": [ + "protect", + "mcp", + "governance" + ], + "triggers": [ + "protect", + "mcp", + "governance", + "agent", + "skill", + "calls", + "cedar", + "policy", + "authoring", + "shadow", + "enforce", + "rollout" + ], + "path": "skills/protect-mcp-governance/SKILL.md" + }, { "id": "protocol-reverse-engineering", "name": "protocol-reverse-engineering", diff --git a/data/plugin-compatibility.json b/data/plugin-compatibility.json index 0ffec43d..73589b00 100644 --- a/data/plugin-compatibility.json +++ b/data/plugin-compatibility.json @@ -18968,6 +18968,25 @@ }, "runtime_files": [] }, + { + "id": "protect-mcp-governance", + "path": "skills/protect-mcp-governance", + "targets": { + "codex": "supported", + "claude": "supported" + }, + "setup": { + "type": "none", + "summary": "", + "docs": null + }, + "reasons": [], + "blocked_reasons": { + "codex": [], + "claude": [] + }, + "runtime_files": [] + }, { "id": "protocol-reverse-engineering", "path": "skills/protocol-reverse-engineering", @@ -26249,10 +26268,10 @@ } ], "summary": { - "total_skills": 1373, + "total_skills": 1374, "supported": { - "codex": 1344, - "claude": 1359 + "codex": 1345, + "claude": 1360 }, "blocked": { "codex": 29, diff --git a/docs/integrations/jetski-cortex.md b/docs/integrations/jetski-cortex.md index cc3e6ca5..2789528a 100644 --- a/docs/integrations/jetski-cortex.md +++ b/docs/integrations/jetski-cortex.md @@ -1,9 +1,9 @@ --- title: Jetski/Cortex + Gemini Integration Guide -description: "Use antigravity-awesome-skills with Jetski/Cortex without hitting context-window overflow with 1.373+ skills." +description: "Use antigravity-awesome-skills with Jetski/Cortex without hitting context-window overflow with 1.374+ skills." --- -# Jetski/Cortex + Gemini: safe integration with 1,1.373+ skills +# Jetski/Cortex + Gemini: safe integration with 1,1.374+ skills This guide shows how to integrate the `antigravity-awesome-skills` repository with an agent based on **Jetski/Cortex + Gemini** (or similar frameworks) **without exceeding the model context window**. @@ -23,7 +23,7 @@ Never do: - concatenate all `SKILL.md` content into a single system prompt; - re-inject the entire library for **every** request. -With over 1,1.373 skills, this approach fills the context window before user messages are even added, causing truncation. +With over 1,1.374 skills, this approach fills the context window before user messages are even added, causing truncation. --- diff --git a/docs/integrations/jetski-gemini-loader/README.md b/docs/integrations/jetski-gemini-loader/README.md index 458a6812..67061a8a 100644 --- a/docs/integrations/jetski-gemini-loader/README.md +++ b/docs/integrations/jetski-gemini-loader/README.md @@ -20,7 +20,7 @@ This example shows one way to integrate **antigravity-awesome-skills** with a Je - How to enforce a **maximum number of skills per turn** via `maxSkillsPerTurn`. - How to choose whether to **truncate or error** when too many skills are requested via `overflowBehavior`. -This pattern avoids context overflow when you have 1,373+ skills installed. +This pattern avoids context overflow when you have 1,374+ skills installed. --- diff --git a/docs/maintainers/repo-growth-seo.md b/docs/maintainers/repo-growth-seo.md index 1b0103c5..4dbbbcb8 100644 --- a/docs/maintainers/repo-growth-seo.md +++ b/docs/maintainers/repo-growth-seo.md @@ -6,7 +6,7 @@ This document keeps the repository's GitHub-facing discovery copy aligned with t Preferred positioning: -> Installable GitHub library of 1,373+ agentic skills for Claude Code, Cursor, Codex CLI, Gemini CLI, Antigravity, and other AI coding assistants. +> Installable GitHub library of 1,374+ agentic skills for Claude Code, Cursor, Codex CLI, Gemini CLI, Antigravity, and other AI coding assistants. Key framing: @@ -20,7 +20,7 @@ Key framing: Preferred description: -> Installable GitHub library of 1,373+ agentic skills for Claude Code, Cursor, Codex CLI, Gemini CLI, Antigravity, and more. Includes installer CLI, bundles, workflows, and official/community skill collections. +> Installable GitHub library of 1,374+ agentic skills for Claude Code, Cursor, Codex CLI, Gemini CLI, Antigravity, and more. Includes installer CLI, bundles, workflows, and official/community skill collections. Preferred homepage: @@ -28,7 +28,7 @@ Preferred homepage: Preferred social preview: -- use a clean preview image that says `1,373+ Agentic Skills`; +- use a clean preview image that says `1,374+ Agentic Skills`; - mention Claude Code, Cursor, Codex CLI, and Gemini CLI; - avoid dense text and tiny logos that disappear in social cards. diff --git a/docs/maintainers/skills-update-guide.md b/docs/maintainers/skills-update-guide.md index 38e7e020..a48124d9 100644 --- a/docs/maintainers/skills-update-guide.md +++ b/docs/maintainers/skills-update-guide.md @@ -69,7 +69,7 @@ For manual updates, you need: The update process refreshes: - Skills index (`skills_index.json`) - Web app skills data (`apps\web-app\public\skills.json`) -- All 1,373+ skills from the skills directory +- All 1,374+ skills from the skills directory ## When to Update diff --git a/docs/users/bundles.md b/docs/users/bundles.md index 06534389..d6dfbb86 100644 --- a/docs/users/bundles.md +++ b/docs/users/bundles.md @@ -673,4 +673,4 @@ Found a skill that should be in a bundle? Or want to create a new bundle? [Open --- -_Last updated: March 2026 | Total Skills: 1,373+ | Total Bundles: 37_ +_Last updated: March 2026 | Total Skills: 1,374+ | Total Bundles: 37_ diff --git a/docs/users/claude-code-skills.md b/docs/users/claude-code-skills.md index a42dcb32..01fef971 100644 --- a/docs/users/claude-code-skills.md +++ b/docs/users/claude-code-skills.md @@ -12,7 +12,7 @@ Install the library into Claude Code, then invoke focused skills directly in the ## Why use this repo for Claude Code -- It includes 1,373+ skills instead of a narrow single-domain starter pack. +- It includes 1,374+ skills instead of a narrow single-domain starter pack. - It supports the standard `.claude/skills/` path and the Claude Code plugin marketplace flow. - It also ships generated bundle plugins so teams can install focused packs like `Essentials` or `Security Developer` from the marketplace metadata. - It includes onboarding docs, bundles, and workflows so new users do not need to guess where to begin. diff --git a/docs/users/gemini-cli-skills.md b/docs/users/gemini-cli-skills.md index 34f3e4e7..f43dd657 100644 --- a/docs/users/gemini-cli-skills.md +++ b/docs/users/gemini-cli-skills.md @@ -12,7 +12,7 @@ Install into the Gemini skills path, then ask Gemini to apply one skill at a tim - It installs directly into the expected Gemini skills path. - It includes both core software engineering skills and deeper agent/LLM-oriented skills. -- It helps new users get started with bundles and workflows rather than forcing a cold start from 1,373+ files. +- It helps new users get started with bundles and workflows rather than forcing a cold start from 1,374+ files. - It is useful whether you want a broad internal skill library or a single repo to test many workflows quickly. ## Install Gemini CLI Skills diff --git a/docs/users/kiro-integration.md b/docs/users/kiro-integration.md index 3fb98b09..8780f7f7 100644 --- a/docs/users/kiro-integration.md +++ b/docs/users/kiro-integration.md @@ -18,7 +18,7 @@ Kiro is AWS's agentic AI IDE that combines: Kiro's agentic capabilities are enhanced by skills that provide: -- **Domain expertise** across 1,373+ specialized areas +- **Domain expertise** across 1,374+ specialized areas - **Best practices** from Anthropic, OpenAI, Google, Microsoft, and AWS - **Workflow automation** for common development tasks - **AWS-specific patterns** for serverless, infrastructure, and cloud architecture diff --git a/docs/users/usage.md b/docs/users/usage.md index 3cc6f153..b3326819 100644 --- a/docs/users/usage.md +++ b/docs/users/usage.md @@ -14,7 +14,7 @@ If you came in through a **Claude Code** or **Codex** plugin instead of a full l When you ran `npx antigravity-awesome-skills` or cloned the repository, you: -βœ… **Downloaded 1,373+ skill files** to your computer (default: `~/.gemini/antigravity/skills/`; or a custom path like `~/.agent/skills/` if you used `--path`) +βœ… **Downloaded 1,374+ skill files** to your computer (default: `~/.gemini/antigravity/skills/`; or a custom path like `~/.agent/skills/` if you used `--path`) βœ… **Made them available** to your AI assistant ❌ **Did NOT enable them all automatically** (they're just sitting there, waiting) @@ -34,7 +34,7 @@ Bundles are **curated groups** of skills organized by role. They help you decide **Analogy:** -- You installed a toolbox with 1,373+ tools (βœ… done) +- You installed a toolbox with 1,374+ tools (βœ… done) - Bundles are like **labeled organizer trays** saying: "If you're a carpenter, start with these 10 tools" - You can either **pick skills from the tray** or install that tray as a focused marketplace bundle plugin @@ -212,7 +212,7 @@ Let's actually use a skill right now. Follow these steps: ## Step 5: Picking Your First Skills (Practical Advice) -Don't try to use all 1,373+ skills at once. Here's a sensible approach: +Don't try to use all 1,374+ skills at once. Here's a sensible approach: If you want a tool-specific starting point before choosing skills, use: @@ -343,7 +343,7 @@ Usually no, but if your AI doesn't recognize a skill: ### "Can I load all skills into the model at once?" -No. Even though you have 1,373+ skills installed locally, you should **not** concatenate every `SKILL.md` into a single system prompt or context block. +No. Even though you have 1,374+ skills installed locally, you should **not** concatenate every `SKILL.md` into a single system prompt or context block. The intended pattern is: diff --git a/docs/users/visual-guide.md b/docs/users/visual-guide.md index fb1344d6..13db3e87 100644 --- a/docs/users/visual-guide.md +++ b/docs/users/visual-guide.md @@ -34,7 +34,7 @@ antigravity-awesome-skills/ β”œβ”€β”€ πŸ“„ CONTRIBUTING.md ← Contributor workflow β”œβ”€β”€ πŸ“„ CATALOG.md ← Full generated catalog β”‚ -β”œβ”€β”€ πŸ“ skills/ ← 1,373+ skills live here +β”œβ”€β”€ πŸ“ skills/ ← 1,374+ skills live here β”‚ β”‚ β”‚ β”œβ”€β”€ πŸ“ brainstorming/ β”‚ β”‚ └── πŸ“„ SKILL.md ← Skill definition @@ -47,7 +47,7 @@ antigravity-awesome-skills/ β”‚ β”‚ └── πŸ“ 2d-games/ β”‚ β”‚ └── πŸ“„ SKILL.md ← Nested skills also supported β”‚ β”‚ -β”‚ └── ... (1,373+ total) +β”‚ └── ... (1,374+ total) β”‚ β”œβ”€β”€ πŸ“ apps/ β”‚ └── πŸ“ web-app/ ← Interactive browser @@ -100,7 +100,7 @@ antigravity-awesome-skills/ ``` β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” - β”‚ 1,373+ SKILLS β”‚ + β”‚ 1,374+ SKILLS β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” @@ -201,7 +201,7 @@ If you want a workspace-style manual install instead, cloning into `.agent/skill β”‚ β”œβ”€β”€ πŸ“ brainstorming/ β”‚ β”‚ β”œβ”€β”€ πŸ“ stripe-integration/ β”‚ β”‚ β”œβ”€β”€ πŸ“ react-best-practices/ β”‚ -β”‚ └── ... (1,373+ total) β”‚ +β”‚ └── ... (1,374+ total) β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ ``` diff --git a/package.json b/package.json index 6294c32e..660e997b 100644 --- a/package.json +++ b/package.json @@ -1,7 +1,7 @@ { "name": "antigravity-awesome-skills", "version": "9.7.0", - "description": "1,373+ agentic skills for Claude Code, Gemini CLI, Cursor, Antigravity & more. Installer CLI.", + "description": "1,374+ agentic skills for Claude Code, Gemini CLI, Cursor, Antigravity & more. Installer CLI.", "license": "MIT", "scripts": { "validate": "node tools/scripts/run-python.js tools/scripts/validate_skills.py", diff --git a/plugins/antigravity-awesome-skills-claude/.claude-plugin/plugin.json b/plugins/antigravity-awesome-skills-claude/.claude-plugin/plugin.json index e0b6bdbd..05270b77 100644 --- a/plugins/antigravity-awesome-skills-claude/.claude-plugin/plugin.json +++ b/plugins/antigravity-awesome-skills-claude/.claude-plugin/plugin.json @@ -1,7 +1,7 @@ { "name": "antigravity-awesome-skills", "version": "9.7.0", - "description": "Plugin-safe Claude Code distribution of Antigravity Awesome Skills with 1,359 supported skills.", + "description": "Plugin-safe Claude Code distribution of Antigravity Awesome Skills with 1,360 supported skills.", "author": { "name": "sickn33 and contributors", "url": "https://github.com/sickn33/antigravity-awesome-skills" diff --git a/plugins/antigravity-awesome-skills-claude/skills/protect-mcp-governance/SKILL.md b/plugins/antigravity-awesome-skills-claude/skills/protect-mcp-governance/SKILL.md new file mode 100644 index 00000000..df414f55 --- /dev/null +++ b/plugins/antigravity-awesome-skills-claude/skills/protect-mcp-governance/SKILL.md @@ -0,0 +1,286 @@ +--- +name: protect-mcp-governance +description: "Agent governance skill for MCP tool calls β€” Cedar policy authoring, shadow-to-enforce rollout, and Ed25519 receipt verification." +risk: safe +source: community +source_repo: scopeblind/scopeblind-gateway +source_type: official +date_added: "2026-04-05" +--- + +# MCP Agent Governance with protect-mcp + +## Overview + +Guidance for governing AI agent tool calls using Cedar policies and Ed25519 signed receipts. This skill teaches how to write access-control policies for MCP servers, run them in shadow mode for observation, and verify the cryptographic audit trail. + +## When to Use This Skill + +- Use when you need to control which MCP tools an agent can call and under what conditions +- Use when you want a tamper-evident audit trail for agent tool executions +- Use when rolling out governance policies gradually (shadow mode first, then enforce) +- Use when authoring Cedar policies for MCP tool access control +- Use when verifying that a receipt or audit bundle has not been tampered with + +## Do Not Use This Skill + +- When you need general application security auditing (use `@security-auditor`) +- When you need to scan code for vulnerabilities (use `@security-audit`) +- When you need compliance framework guidance without agent-specific governance + +## How It Works + +protect-mcp intercepts MCP tool calls, evaluates them against Cedar policies (the same policy engine used by AWS Verified Permissions), and signs every decision as an Ed25519 receipt. The receipt is a cryptographic proof that a specific policy was evaluated against a specific tool call at a specific time. + +``` +Agent β†’ protect-mcp β†’ Cedar policy evaluation β†’ MCP Server + ↓ + Ed25519 signed receipt +``` + +Three modes of operation: + +1. **Shadow mode** (default) β€” logs decisions without blocking. Use this to observe what your policies would do before enforcing them. +2. **Enforce mode** β€” blocks tool calls that violate policy. Use after shadow-mode validation. +3. **Hooks mode** β€” integrates with Claude Code hooks for pre/post tool-call governance. + +## Core Concepts + +### Cedar Policies + +Cedar is a policy language designed for authorization. Policies are evaluated locally via WASM β€” no network calls required. + +```cedar +// Allow read-only file operations +permit( + principal, + action == Action::"call_tool", + resource +) when { + resource.tool_name in ["read_file", "list_directory", "search_files"] +}; + +// Deny destructive operations +forbid( + principal, + action == Action::"call_tool", + resource +) when { + resource.tool_name in ["execute_command", "delete_file", "write_file"] + && resource has args + && resource.args.contains("rm -rf") +}; +``` + +### Signed Receipts + +Every policy decision produces a signed receipt: + +```json +{ + "payload": { + "type": "protectmcp:decision", + "tool_name": "read_file", + "decision": "allow", + "policy_digest": "sha256:9d0fd4c9e72c1d5d", + "issued_at": "2026-04-05T14:32:04.102Z", + "issuer_id": "sb:issuer:de073ae64e43" + }, + "signature": { + "alg": "EdDSA", + "kid": "sb:issuer:de073ae64e43", + "sig": "2a3b5022..." + } +} +``` + +The receipt format follows [IETF Internet-Draft draft-farley-acta-signed-receipts](https://datatracker.ietf.org/doc/draft-farley-acta-signed-receipts/). + +## Step-by-Step Guide + +### 1. Initialize Governance for a Project + +```bash +# Install and initialize hooks (Claude Code integration) +npx protect-mcp init-hooks + +# Or run as a standalone MCP gateway +npx protect-mcp serve +``` + +This creates a `protect-mcp.config.json` and a starter Cedar policy in your project root. + +### 2. Write Your First Policy + +Create `policy.cedar` in your project: + +```cedar +// Start permissive β€” allow everything in shadow mode +permit( + principal, + action == Action::"call_tool", + resource +); +``` + +### 3. Run in Shadow Mode (Observe First) + +```bash +# Shadow mode is the default β€” logs decisions without blocking +npx protect-mcp --policy policy.cedar -- node your-mcp-server.js +``` + +Review the shadow log to understand what your agent is doing before writing restrictive policies. + +### 4. Tighten and Enforce + +Once you understand the tool-call patterns, write specific policies: + +```cedar +// Allow file reads, deny writes outside src/ +permit( + principal, + action == Action::"call_tool", + resource +) when { + resource.tool_name == "read_file" +}; + +permit( + principal, + action == Action::"call_tool", + resource +) when { + resource.tool_name == "write_file" + && resource has args + && resource.args.path like "src/*" +}; + +// Deny everything else +forbid( + principal, + action == Action::"call_tool", + resource +); +``` + +Switch to enforce mode: + +```bash +npx protect-mcp --policy policy.cedar --enforce -- node your-mcp-server.js +``` + +### 5. Verify Receipts + +```bash +# Verify a single receipt +npx @veritasacta/verify receipt.json --key + +# Verify an audit bundle (multiple receipts + keys) +npx @veritasacta/verify bundle.json --bundle + +# Self-test the verifier (proves it works offline) +npx @veritasacta/verify --self-test +``` + +Exit codes: `0` = signature valid (proven authentic), `1` = signature invalid (proven tampered), `2` = verifier error (malformed input). + +## Examples + +### Example 1: Governance for a Claude Code Session + +```bash +# Initialize hooks +npx protect-mcp init-hooks + +# Claude Code now generates a signed receipt for every tool call. +# Receipts are stored in .protect-mcp/receipts/ +``` + +**Explanation:** After initialization, every tool call Claude Code makes is logged with a signed receipt. No tool calls are blocked (shadow mode). + +### Example 2: Restrict a Production MCP Server + +```cedar +// Only allow approved tools with rate limiting +permit( + principal, + action == Action::"call_tool", + resource +) when { + resource.tool_name in [ + "get_customer", + "search_orders", + "list_products" + ] +}; + +forbid( + principal, + action == Action::"call_tool", + resource +) when { + resource.tool_name in [ + "delete_customer", + "modify_payment", + "execute_sql" + ] +}; +``` + +**Explanation:** A production MCP server that serves customer data. Read-only operations are permitted; destructive operations are blocked. + +### Example 3: Verify an Audit Bundle After an Incident + +```bash +# Export the session's audit bundle +npx protect-mcp export-bundle --session sess_abc123 --out audit.json + +# Verify every receipt in the bundle +npx @veritasacta/verify audit.json --bundle + +# Expected output: +# βœ“ Bundle: VALID +# Total: 47 +# Passed: 47 +# Failed: 0 +``` + +**Explanation:** After an incident, export the audit bundle and verify that no receipts have been tampered with. The bundle contains all receipts from the session plus the signing keys needed for verification. + +## Best Practices + +- βœ… **Do:** Start in shadow mode and observe before enforcing +- βœ… **Do:** Use `policy_digest` to track which policy version produced each decision +- βœ… **Do:** Store receipts alongside your application logs for correlation +- βœ… **Do:** Pin the verifier version when integrating into CI (`@veritasacta/verify@0.2.5`) +- ❌ **Don't:** Skip shadow mode and go straight to enforce in production +- ❌ **Don't:** Trust `claimed_issuer_tier` without independent verification +- ❌ **Don't:** Treat a valid signature as proof the signer is trustworthy β€” it only proves the receipt has not been tampered with since signing + +## Troubleshooting + +### Problem: Receipts fail verification with `no_public_key` +**Symptoms:** `npx @veritasacta/verify receipt.json` returns exit 2 with `no_public_key` +**Solution:** Provide the public key explicitly: `--key <64 hex chars>`. The receipt does not embed the public key by default. Check `protect-mcp.config.json` for the issuer's public key. + +### Problem: Shadow mode shows unexpected denials +**Symptoms:** Shadow log shows `deny` decisions for tools you expected to be allowed +**Solution:** Check your Cedar policy ordering. Cedar evaluates `forbid` rules before `permit` rules β€” a broad `forbid` will override specific `permit` rules. + +### Problem: Enforce mode blocks a legitimate tool call +**Symptoms:** Agent reports a tool call was denied after switching to enforce mode +**Solution:** Add the tool to your permit policy or switch back to shadow mode: remove `--enforce` flag. Review the receipt's `deny_reason` field for the specific policy violation. + +## Related Skills + +- `@security-auditor` β€” General security auditing and compliance +- `@security-audit` β€” Code vulnerability scanning +- `@mcp-development` β€” MCP server development patterns + +## Additional Resources + +- [protect-mcp on npm](https://www.npmjs.com/package/protect-mcp) β€” MIT licensed +- [Cedar Policy Language](https://www.cedarpolicy.com/) β€” AWS open-source policy engine +- [IETF Draft: Signed Receipts](https://datatracker.ietf.org/doc/draft-farley-acta-signed-receipts/) β€” Receipt format specification +- [@veritasacta/verify](https://www.npmjs.com/package/@veritasacta/verify) β€” Apache-2.0 verifier, works offline diff --git a/plugins/antigravity-awesome-skills/.codex-plugin/plugin.json b/plugins/antigravity-awesome-skills/.codex-plugin/plugin.json index 67a5ecf8..62350d0f 100644 --- a/plugins/antigravity-awesome-skills/.codex-plugin/plugin.json +++ b/plugins/antigravity-awesome-skills/.codex-plugin/plugin.json @@ -19,7 +19,7 @@ "skills": "./skills/", "interface": { "displayName": "Antigravity Awesome Skills", - "shortDescription": "1,344 plugin-safe skills for coding, security, product, and ops workflows.", + "shortDescription": "1,345 plugin-safe skills for coding, security, product, and ops workflows.", "longDescription": "Install a plugin-safe Codex distribution of Antigravity Awesome Skills. Skills that still need hardening or target-specific setup remain available in the repo but are excluded from this plugin.", "developerName": "sickn33 and contributors", "category": "Productivity", diff --git a/plugins/antigravity-awesome-skills/skills/protect-mcp-governance/SKILL.md b/plugins/antigravity-awesome-skills/skills/protect-mcp-governance/SKILL.md new file mode 100644 index 00000000..df414f55 --- /dev/null +++ b/plugins/antigravity-awesome-skills/skills/protect-mcp-governance/SKILL.md @@ -0,0 +1,286 @@ +--- +name: protect-mcp-governance +description: "Agent governance skill for MCP tool calls β€” Cedar policy authoring, shadow-to-enforce rollout, and Ed25519 receipt verification." +risk: safe +source: community +source_repo: scopeblind/scopeblind-gateway +source_type: official +date_added: "2026-04-05" +--- + +# MCP Agent Governance with protect-mcp + +## Overview + +Guidance for governing AI agent tool calls using Cedar policies and Ed25519 signed receipts. This skill teaches how to write access-control policies for MCP servers, run them in shadow mode for observation, and verify the cryptographic audit trail. + +## When to Use This Skill + +- Use when you need to control which MCP tools an agent can call and under what conditions +- Use when you want a tamper-evident audit trail for agent tool executions +- Use when rolling out governance policies gradually (shadow mode first, then enforce) +- Use when authoring Cedar policies for MCP tool access control +- Use when verifying that a receipt or audit bundle has not been tampered with + +## Do Not Use This Skill + +- When you need general application security auditing (use `@security-auditor`) +- When you need to scan code for vulnerabilities (use `@security-audit`) +- When you need compliance framework guidance without agent-specific governance + +## How It Works + +protect-mcp intercepts MCP tool calls, evaluates them against Cedar policies (the same policy engine used by AWS Verified Permissions), and signs every decision as an Ed25519 receipt. The receipt is a cryptographic proof that a specific policy was evaluated against a specific tool call at a specific time. + +``` +Agent β†’ protect-mcp β†’ Cedar policy evaluation β†’ MCP Server + ↓ + Ed25519 signed receipt +``` + +Three modes of operation: + +1. **Shadow mode** (default) β€” logs decisions without blocking. Use this to observe what your policies would do before enforcing them. +2. **Enforce mode** β€” blocks tool calls that violate policy. Use after shadow-mode validation. +3. **Hooks mode** β€” integrates with Claude Code hooks for pre/post tool-call governance. + +## Core Concepts + +### Cedar Policies + +Cedar is a policy language designed for authorization. Policies are evaluated locally via WASM β€” no network calls required. + +```cedar +// Allow read-only file operations +permit( + principal, + action == Action::"call_tool", + resource +) when { + resource.tool_name in ["read_file", "list_directory", "search_files"] +}; + +// Deny destructive operations +forbid( + principal, + action == Action::"call_tool", + resource +) when { + resource.tool_name in ["execute_command", "delete_file", "write_file"] + && resource has args + && resource.args.contains("rm -rf") +}; +``` + +### Signed Receipts + +Every policy decision produces a signed receipt: + +```json +{ + "payload": { + "type": "protectmcp:decision", + "tool_name": "read_file", + "decision": "allow", + "policy_digest": "sha256:9d0fd4c9e72c1d5d", + "issued_at": "2026-04-05T14:32:04.102Z", + "issuer_id": "sb:issuer:de073ae64e43" + }, + "signature": { + "alg": "EdDSA", + "kid": "sb:issuer:de073ae64e43", + "sig": "2a3b5022..." + } +} +``` + +The receipt format follows [IETF Internet-Draft draft-farley-acta-signed-receipts](https://datatracker.ietf.org/doc/draft-farley-acta-signed-receipts/). + +## Step-by-Step Guide + +### 1. Initialize Governance for a Project + +```bash +# Install and initialize hooks (Claude Code integration) +npx protect-mcp init-hooks + +# Or run as a standalone MCP gateway +npx protect-mcp serve +``` + +This creates a `protect-mcp.config.json` and a starter Cedar policy in your project root. + +### 2. Write Your First Policy + +Create `policy.cedar` in your project: + +```cedar +// Start permissive β€” allow everything in shadow mode +permit( + principal, + action == Action::"call_tool", + resource +); +``` + +### 3. Run in Shadow Mode (Observe First) + +```bash +# Shadow mode is the default β€” logs decisions without blocking +npx protect-mcp --policy policy.cedar -- node your-mcp-server.js +``` + +Review the shadow log to understand what your agent is doing before writing restrictive policies. + +### 4. Tighten and Enforce + +Once you understand the tool-call patterns, write specific policies: + +```cedar +// Allow file reads, deny writes outside src/ +permit( + principal, + action == Action::"call_tool", + resource +) when { + resource.tool_name == "read_file" +}; + +permit( + principal, + action == Action::"call_tool", + resource +) when { + resource.tool_name == "write_file" + && resource has args + && resource.args.path like "src/*" +}; + +// Deny everything else +forbid( + principal, + action == Action::"call_tool", + resource +); +``` + +Switch to enforce mode: + +```bash +npx protect-mcp --policy policy.cedar --enforce -- node your-mcp-server.js +``` + +### 5. Verify Receipts + +```bash +# Verify a single receipt +npx @veritasacta/verify receipt.json --key + +# Verify an audit bundle (multiple receipts + keys) +npx @veritasacta/verify bundle.json --bundle + +# Self-test the verifier (proves it works offline) +npx @veritasacta/verify --self-test +``` + +Exit codes: `0` = signature valid (proven authentic), `1` = signature invalid (proven tampered), `2` = verifier error (malformed input). + +## Examples + +### Example 1: Governance for a Claude Code Session + +```bash +# Initialize hooks +npx protect-mcp init-hooks + +# Claude Code now generates a signed receipt for every tool call. +# Receipts are stored in .protect-mcp/receipts/ +``` + +**Explanation:** After initialization, every tool call Claude Code makes is logged with a signed receipt. No tool calls are blocked (shadow mode). + +### Example 2: Restrict a Production MCP Server + +```cedar +// Only allow approved tools with rate limiting +permit( + principal, + action == Action::"call_tool", + resource +) when { + resource.tool_name in [ + "get_customer", + "search_orders", + "list_products" + ] +}; + +forbid( + principal, + action == Action::"call_tool", + resource +) when { + resource.tool_name in [ + "delete_customer", + "modify_payment", + "execute_sql" + ] +}; +``` + +**Explanation:** A production MCP server that serves customer data. Read-only operations are permitted; destructive operations are blocked. + +### Example 3: Verify an Audit Bundle After an Incident + +```bash +# Export the session's audit bundle +npx protect-mcp export-bundle --session sess_abc123 --out audit.json + +# Verify every receipt in the bundle +npx @veritasacta/verify audit.json --bundle + +# Expected output: +# βœ“ Bundle: VALID +# Total: 47 +# Passed: 47 +# Failed: 0 +``` + +**Explanation:** After an incident, export the audit bundle and verify that no receipts have been tampered with. The bundle contains all receipts from the session plus the signing keys needed for verification. + +## Best Practices + +- βœ… **Do:** Start in shadow mode and observe before enforcing +- βœ… **Do:** Use `policy_digest` to track which policy version produced each decision +- βœ… **Do:** Store receipts alongside your application logs for correlation +- βœ… **Do:** Pin the verifier version when integrating into CI (`@veritasacta/verify@0.2.5`) +- ❌ **Don't:** Skip shadow mode and go straight to enforce in production +- ❌ **Don't:** Trust `claimed_issuer_tier` without independent verification +- ❌ **Don't:** Treat a valid signature as proof the signer is trustworthy β€” it only proves the receipt has not been tampered with since signing + +## Troubleshooting + +### Problem: Receipts fail verification with `no_public_key` +**Symptoms:** `npx @veritasacta/verify receipt.json` returns exit 2 with `no_public_key` +**Solution:** Provide the public key explicitly: `--key <64 hex chars>`. The receipt does not embed the public key by default. Check `protect-mcp.config.json` for the issuer's public key. + +### Problem: Shadow mode shows unexpected denials +**Symptoms:** Shadow log shows `deny` decisions for tools you expected to be allowed +**Solution:** Check your Cedar policy ordering. Cedar evaluates `forbid` rules before `permit` rules β€” a broad `forbid` will override specific `permit` rules. + +### Problem: Enforce mode blocks a legitimate tool call +**Symptoms:** Agent reports a tool call was denied after switching to enforce mode +**Solution:** Add the tool to your permit policy or switch back to shadow mode: remove `--enforce` flag. Review the receipt's `deny_reason` field for the specific policy violation. + +## Related Skills + +- `@security-auditor` β€” General security auditing and compliance +- `@security-audit` β€” Code vulnerability scanning +- `@mcp-development` β€” MCP server development patterns + +## Additional Resources + +- [protect-mcp on npm](https://www.npmjs.com/package/protect-mcp) β€” MIT licensed +- [Cedar Policy Language](https://www.cedarpolicy.com/) β€” AWS open-source policy engine +- [IETF Draft: Signed Receipts](https://datatracker.ietf.org/doc/draft-farley-acta-signed-receipts/) β€” Receipt format specification +- [@veritasacta/verify](https://www.npmjs.com/package/@veritasacta/verify) β€” Apache-2.0 verifier, works offline diff --git a/skills_index.json b/skills_index.json index eed68f59..b99fb087 100644 --- a/skills_index.json +++ b/skills_index.json @@ -21870,6 +21870,28 @@ "reasons": [] } }, + { + "id": "protect-mcp-governance", + "path": "skills/protect-mcp-governance", + "category": "uncategorized", + "name": "protect-mcp-governance", + "description": "Agent governance skill for MCP tool calls \u2014 Cedar policy authoring, shadow-to-enforce rollout, and Ed25519 receipt verification.", + "risk": "safe", + "source": "community", + "date_added": "2026-04-05", + "plugin": { + "targets": { + "codex": "supported", + "claude": "supported" + }, + "setup": { + "type": "none", + "summary": "", + "docs": null + }, + "reasons": [] + } + }, { "id": "protocol-reverse-engineering", "path": "skills/protocol-reverse-engineering",