[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"extension-plugin-wshobson-signed-audit-trails-es":3,"guides-for-wshobson-signed-audit-trails":272,"similar-k1709k0ebzghvbebv41vyqpsah864wf8":273},{"_creationTime":4,"_id":5,"children":6,"community":7,"display":9,"evaluation":22,"identity":213,"isFallback":218,"parentExtension":219,"providers":254,"relations":258,"repo":259,"workflow":270},1778003443243.3271,"k1709k0ebzghvbebv41vyqpsah864wf8",[],{"reviewCount":8},0,{"description":10,"installMethods":11,"name":12,"sourceUrl":13,"tags":14},"Teaching skill: cookbook-style walkthrough for signed audit trails on every Claude Code tool call. Cedar policy, Ed25519 receipts, offline verification, CI/CD integration, SLSA composition. Pairs with the protect-mcp runtime plugin.",{},"Signed Audit Trails","https://github.com/wshobson/agents/tree/HEAD/plugins/signed-audit-trails",[15,16,17,18,19,20,21],"security","audit-trails","compliance","cryptography","teaching-skill","cedar","ed25519",{"_creationTime":23,"_id":24,"extensionId":5,"locale":25,"result":26,"trustSignals":202,"workflow":211},1778016883287.2349,"kn772p94691yh9txyyrje2gxen864nv8","en",{"checks":27,"evaluatedAt":192,"extensionSummary":193,"promptVersionExtension":194,"promptVersionScoring":195,"rationale":196,"score":197,"summary":198,"tags":199,"targetMarket":200,"tier":201},[28,33,36,40,44,47,52,56,59,62,66,70,73,77,80,83,86,89,92,95,98,102,106,110,114,117,120,123,127,130,133,136,139,142,146,149,152,156,159,162,165,168,171,174,178,181,184,188],{"category":29,"check":30,"severity":31,"summary":32},"Practical Utility","Problem relevance","pass","The description clearly articulates the problem of needing signed audit trails for agent tool calls, specifically mentioning compliance and tamper detection needs.",{"category":29,"check":34,"severity":31,"summary":35},"Unique selling proposition","The extension offers a unique approach by providing a teaching skill for signed audit trails using cryptographic methods (Ed25519, JCS, Cedar) and offline verification, which is beyond a simple wrapper.",{"category":29,"check":37,"severity":38,"summary":39},"Production readiness","warning","This is a teaching skill with manual setup instructions, not a direct production-ready runtime hook. The actual production implementation is in a separate plugin (`protect-mcp`), making this skill a preparatory step rather than a deployable solution.",{"category":41,"check":42,"severity":31,"summary":43},"Scope","Single responsibility principle","The plugin focuses solely on demonstrating and teaching the pattern of signed audit trails for Claude Code tool calls, aligning with its name and description.",{"category":41,"check":45,"severity":31,"summary":46},"Description quality","The displayed description is concise, readable, and accurately reflects the function of the skill as a teaching walkthrough for signed audit trails.",{"category":48,"check":49,"severity":50,"summary":51},"Invocation","Scoped tools","not_applicable","This is a teaching skill and does not expose any tools directly; it relies on Claude Code's existing tools and the commands within its SKILL.md file for demonstration.",{"category":53,"check":54,"severity":31,"summary":55},"Documentation","Configuration & parameter reference","The README provides clear, step-by-step instructions for setting up the hooks, policy, and gitignore, including necessary commands and file contents. It also explains how to interpret the receipt format and common pitfalls.",{"category":41,"check":57,"severity":50,"summary":58},"Tool naming","As a teaching skill, it does not expose user-facing tools with distinct names. The skill itself is named `signed-audit-trails-recipe`.",{"category":41,"check":60,"severity":50,"summary":61},"Minimal I/O surface","This is a teaching skill and does not have its own tools or commands with input/output schemas to evaluate.",{"category":63,"check":64,"severity":31,"summary":65},"License","License usability","A LICENSE file with the MIT license is present at the repository root, and the `plugin.json` also specifies MIT, indicating a permissive open-source license.",{"category":67,"check":68,"severity":50,"summary":69},"Maintenance","Commit recency","The provided trust signals indicate 'n/a' for last commit date, and the repository file count is low. Without a default branch commit date, this check cannot be performed.",{"category":67,"check":71,"severity":50,"summary":72},"Dependency Management","The extension itself has no third-party dependencies listed in its manifest or package.json. It relies on external tools like `npx protect-mcp` and `@veritasacta/verify` which are called via CLI, but these are not bundled dependencies.",{"category":74,"check":75,"severity":31,"summary":76},"Security","Secret Management","The README explicitly warns against committing the generated private key and directs users to add it to `.gitignore`, indicating awareness of secret handling.",{"category":74,"check":78,"severity":31,"summary":79},"Injection","The documentation warns about hook command quoting and treats the configuration as data, not instructions to be executed directly by the agent without security considerations.",{"category":74,"check":81,"severity":31,"summary":82},"Transitive Supply-Chain Grenades","The extension relies on external CLI tools (`npx protect-mcp`, `@veritasacta/verify`) but does not fetch remote code or data at runtime to execute. The setup is documented and relies on installed packages.",{"category":74,"check":84,"severity":31,"summary":85},"Sandbox Isolation","The instructions guide the user to configure hooks and policies that operate within the project directory (`./`) and explicitly deny destructive operations, promoting sandbox isolation.",{"category":74,"check":87,"severity":31,"summary":88},"Sandbox escape primitives","The provided configuration and example policy focus on restricting actions and do not show any obvious sandbox escape primitives like detached processes or retry loops.",{"category":74,"check":90,"severity":31,"summary":91},"Data Exfiltration","The extension's purpose is to log and sign existing tool calls. There are no instructions or mechanisms described for reading and submitting confidential data to a third party. The signing process is local.",{"category":74,"check":93,"severity":31,"summary":94},"Hidden Text Tricks","The bundled files (README, SKILL.md, plugin.json) are free of hidden text, invisible characters, or other tricks designed to steer the model surreptitiously.",{"category":74,"check":96,"severity":31,"summary":97},"Opaque code execution","The setup involves running external CLI commands (`npx protect-mcp`) and configuring hooks, but the bundled code itself (plugin.json, SKILL.md) is readable and does not contain obfuscated or runtime-fetched code execution.",{"category":99,"check":100,"severity":31,"summary":101},"Portability","Structural Assumption","The instructions specify paths relative to the project root (e.g., `./protect.cedar`, `./receipts/`), and the README explicitly mentions adding these to `.gitignore`, making it portable.",{"category":103,"check":104,"severity":50,"summary":105},"Trust","Issues Attention","The provided trust signals indicate 'n/a' for issues opened and closed, so this check cannot be performed.",{"category":107,"check":108,"severity":38,"summary":109},"Versioning","Release Management","The `plugin.json` has a version `0.1.0`, but there are no GitHub release tags or a CHANGELOG.md, and the README does not reference a specific version for installation, suggesting potential for unpinned dependencies if used in a larger system.",{"category":111,"check":112,"severity":31,"summary":113},"Code Execution","Validation","The Cedar policy and the `protect-mcp` CLI commands invoked by the hooks perform validation on tool calls and inputs, ensuring adherence to defined rules before execution or signing.",{"category":74,"check":115,"severity":31,"summary":116},"Unguarded Destructive Operations","The Cedar policy explicitly forbids destructive bash commands like `rm -rf`, and the hooks are designed for logging and verification, not destructive operations.",{"category":111,"check":118,"severity":31,"summary":119},"Error Handling","The instructions for the `protect-mcp` CLI and Cedar policy implicitly cover error handling by explicitly allowing/denying actions and the usage of `npx` assumes standard command-line error reporting.",{"category":111,"check":121,"severity":31,"summary":122},"Logging","The core functionality is to generate signed audit trails (receipts) which serve as a structured log of tool calls and their outcomes.",{"category":124,"check":125,"severity":31,"summary":126},"Compliance","GDPR","The extension focuses on logging tool execution metadata, not personal data. It does not appear to operate on or submit personal data to third parties.",{"category":124,"check":128,"severity":31,"summary":129},"Target market","The extension's focus on signed audit trails, compliance, and verification is globally applicable. No specific geographic or legal jurisdiction is encoded.",{"category":99,"check":131,"severity":31,"summary":132},"Runtime stability","The setup relies on standard Node.js execution (`npx`) and common CLI tools, making it portable across POSIX-compliant systems. The hooks are configured via environment variables and standard configurations.",{"category":41,"check":134,"severity":50,"summary":135},"Tool surface size","This is a teaching skill and does not expose any tools or commands directly to the user.",{"category":48,"check":137,"severity":50,"summary":138},"Name collisions","This plugin consists of a single skill and does not bundle multiple extensions, thus there are no name collisions to evaluate.",{"category":48,"check":140,"severity":50,"summary":141},"Overlapping near-synonym tools","This plugin does not expose any user-facing tools or commands.",{"category":48,"check":143,"severity":144,"summary":145},"Hooks-off mechanism","info","There is no explicit documented 'hooks-off' mechanism for this teaching skill. The user would need to remove the hook configuration from `.claude/settings.json` to disable it.",{"category":48,"check":147,"severity":31,"summary":148},"Hook matcher tightness","The hooks are configured with '`.*`' matchers, but these are applied to specific `PreToolUse` and `PostToolUse` types and delegate to external tools with specific arguments (`--tool`, `--input`, `--policy`), which are then validated by Cedar and `protect-mcp`.",{"category":74,"check":150,"severity":31,"summary":151},"Hook security","The hooks described are for evaluating policy and signing receipts, which are inherently non-destructive and do not perform network calls beyond invoking the `protect-mcp` CLI. The focus is on local file operations and policy enforcement.",{"category":153,"check":154,"severity":50,"summary":155},"Hooks","Silent prompt rewriting","This plugin does not implement a `UserPromptSubmit` hook, so silent prompt rewriting is not applicable.",{"category":74,"check":157,"severity":50,"summary":158},"Permission Hook","This plugin does not implement a `PermissionRequest` hook, so auto-approval of permissions is not applicable.",{"category":124,"check":160,"severity":31,"summary":161},"Hook privacy","The hooks generate local receipts and do not send data over the network for logging or telemetry purposes. The signing process is entirely local.",{"category":111,"check":163,"severity":31,"summary":164},"Hook dependency","The hooks are defined in `.claude/settings.json` and rely on external, documented CLI tools (`protect-mcp`). These are installed via `npx`, which is standard practice and does not involve opaque or bundled code.",{"category":53,"check":166,"severity":31,"summary":167},"Install / Setup Instructions","The README provides clear, step-by-step installation and setup instructions, including configuration files and commands, making it easy for users to get started.",{"category":53,"check":169,"severity":31,"summary":170},"Feature Transparency","The README clearly explains the purpose and functionality of the signed audit trails, including the cryptographic standards used and the setup process.",{"category":53,"check":172,"severity":31,"summary":173},"Phantom features","All features described in the README (signed audit trails, Cedar policy integration, Ed25519 receipts, verification) are directly supported by the provided setup instructions and references to external tools.",{"category":175,"check":176,"severity":31,"summary":177},"Convention","Layout convention adherence","The plugin structure aligns with typical Claude Code plugin conventions, with configuration defined in `.claude/settings.json` and external tools invoked via `npx`. The README also mentions the related `protect-mcp` plugin in the parent directory.",{"category":175,"check":179,"severity":31,"summary":180},"Plugin state","The private key is generated locally and recommended to be added to `.gitignore`. Receipts are also stored locally. The instructions do not indicate state being written outside the project directory or outside `${CLAUDE_PLUGIN_DATA}`.",{"category":74,"check":182,"severity":50,"summary":183},"Keychain-stored secrets","The plugin does not consume secrets via `userConfig`. The private key is managed locally in the project directory, with explicit instructions on how to handle it.",{"category":185,"check":186,"severity":31,"summary":187},"Dependencies","Tagged release sourcing","The extension relies on `npx protect-mcp@latest` and `npx @veritasacta/verify`. While `@latest` can be problematic, the documentation implies these are standard, published npm packages, and the `protect-mcp` plugin itself is in the same marketplace, suggesting a managed ecosystem.",{"category":189,"check":190,"severity":31,"summary":191},"Installation","Clean uninstall","The extension primarily involves adding configuration to `.claude/settings.json` and generating local files. There are no background daemons, cron jobs, or persistent services spawned that would survive an uninstall.",1778016825406,"This plugin serves as an educational resource, guiding users through setting up signed audit trails using Ed25519 receipts and Cedar policies. It focuses on demonstrating tamper detection and verification concepts before users implement the actual runtime hooks via the `protect-mcp` plugin.","2.0.0","3.4.0","This plugin is a high-quality teaching skill that clearly explains a complex security pattern. It passes most checks with 'pass' or 'not_applicable'. The 'Release Management' check received a warning due to the lack of specific versioning beyond the initial `0.1.0` and no CHANGELOG. The 'Hooks-off mechanism' check is 'info' as there's no explicit toggle, though disabling is possible via manual configuration removal. The overall score is high due to strong documentation, security focus, and clear educational purpose.",95,"A well-documented teaching skill for implementing cryptographically signed audit trails on Claude Code tool calls, with clear instructions for setup and verification.",[15,16,17,18,19,20,21],"global","verified",{"codeQuality":203,"collectedAt":204,"documentation":205,"maintenance":207,"security":208,"testCoverage":210},{},1778016809896,{"descriptionLength":206,"readmeSize":8},232,{},{"hasNpmPackage":209,"smitheryVerified":209},false,{"hasCi":209,"hasTests":209},{"updatedAt":212},1778016883287,{"githubOwner":214,"githubRepo":215,"locale":25,"slug":216,"type":217},"wshobson","agents","signed-audit-trails","plugin",true,{"_creationTime":220,"_id":221,"community":222,"display":223,"identity":235,"parentExtension":238,"providers":239,"relations":247,"workflow":249},1778003443243.2886,"k175qypm0s8m8k6a0fkxpxfj1n865ax9",{"reviewCount":8},{"description":224,"installMethods":225,"name":226,"sourceUrl":227,"tags":228},"Production-ready workflow orchestration with 79 focused plugins, 184 specialized agents, and 150 skills - optimized for granular installation and minimal token usage",{},"Claude Code Plugins: Orchestration and Automation","https://github.com/wshobson/agents",[229,230,231,232,233,234],"workflow-orchestration","ai-agents","plugins","development-tools","automation","developer-experience",{"githubOwner":214,"githubRepo":215,"locale":25,"slug":236,"type":237},"claude-code-workflows","marketplace",null,{"extract":240,"smithery":246},{"commitSha":241,"license":242,"marketplace":243},"ece811f23310a37ceb43496dbac0e244fe6845b6","MIT",{"name":236,"pluginCount":244,"version":245},81,"1.6.0",{"qualityScore":8,"totalActivations":8,"uniqueUsers":8,"useCount":8,"verified":209},{"repoId":248},"kd72tes1veaz04ac7p0d68ya4h8650m7",{"anyEnrichmentAt":250,"extractAt":251,"githubAt":252,"invalidatedAt":250,"llmAt":253,"smitheryAt":250,"updatedAt":250},1778016735335,1778003520097,1778003532786,1778016730286,{"extract":255,"llm":256,"smithery":257},{"commitSha":241,"license":242},{"promptVersionExtension":194,"promptVersionScoring":195,"score":197,"targetMarket":200,"tier":201},{"qualityScore":8,"totalActivations":8,"uniqueUsers":8,"useCount":8,"verified":209},{"parentExtensionId":221,"repoId":248},{"_creationTime":260,"_id":248,"identity":261,"providers":262,"workflow":268},1777995558409.8196,{"githubOwner":214,"githubRepo":215,"sourceUrl":227},{"discover":263},{"sources":264},[265,266,267],"skills-sh","smithery","vskill",{"discoverAt":269,"extractAt":251,"updatedAt":251},1777995558409,{"anyEnrichmentAt":271,"extractAt":251,"githubAt":252,"llmAt":212,"smitheryAt":271,"updatedAt":212},1778016861516,[],[274,297,333,366,398,430],{"_creationTime":275,"_id":276,"community":277,"display":278,"identity":289,"providers":290,"relations":295,"workflow":296},1778003443243.3267,"k173antev34n0d1ntkn4qm912x865qqc",{"reviewCount":8},{"description":279,"installMethods":280,"name":281,"sourceUrl":282,"tags":283},"Cedar policy enforcement + Ed25519 signed receipts for every Claude Code tool call. First cryptographic governance plugin — decisions are policy-gated before they run and every decision produces a tamper-evident receipt verifiable offline.",{},"protect-mcp","https://github.com/wshobson/agents/tree/HEAD/plugins/protect-mcp",[15,284,285,286,287,20,288],"governance","audit","policy","receipts","cli",{"githubOwner":214,"githubRepo":215,"locale":25,"slug":281,"type":217},{"extract":291,"llm":292,"smithery":294},{"commitSha":241,"license":242},{"promptVersionExtension":194,"promptVersionScoring":195,"score":293,"targetMarket":200,"tier":201},96,{"qualityScore":8,"totalActivations":8,"uniqueUsers":8,"useCount":8,"verified":209},{"parentExtensionId":221,"repoId":248},{"anyEnrichmentAt":271,"extractAt":251,"githubAt":252,"llmAt":212,"smitheryAt":271,"updatedAt":212},{"_creationTime":298,"_id":299,"community":300,"display":301,"identity":316,"providers":319,"relations":325,"workflow":328},1777995627391.5356,"k177z2t3rfgaw0zrb7qprpnndh864r09",{"reviewCount":8},{"description":302,"installMethods":303,"name":304,"sourceUrl":305,"tags":306},"Data observability plugin - health monitoring, alerts, schema drift, freshness tracking",{},"AnomalyArmor Agents","https://github.com/anomalyarmor/agents",[307,308,309,310,311,312,313,314,15,315],"data-observability","mcp","python","alerts","freshness","schema-drift","data-quality","monitoring","pipeline",{"githubOwner":317,"githubRepo":215,"locale":25,"slug":318,"type":217},"anomalyarmor","armor",{"extract":320,"llm":322,"smithery":324},{"commitSha":321},"7c56d4a0fc8feccdfa8e85cc11ff1010b18c3a89",{"promptVersionExtension":194,"promptVersionScoring":195,"score":323,"targetMarket":200,"tier":201},99,{"qualityScore":8,"totalActivations":8,"uniqueUsers":8,"useCount":8,"verified":209},{"parentExtensionId":326,"repoId":327},"k173vznv6dcx28h1c568068tnx864f8n","kd7966c5zsgty1d4tqde2rgz1n8658b1",{"anyEnrichmentAt":329,"extractAt":330,"githubAt":331,"llmAt":332,"smitheryAt":329,"updatedAt":332},1777995723550,1777995627391,1777995627861,1777995897177,{"_creationTime":334,"_id":335,"community":336,"display":337,"identity":347,"providers":351,"relations":358,"workflow":361},1778054452948.4253,"k1767a8yk98h8qcz0rkh7t64an867zws",{"reviewCount":8},{"description":338,"installMethods":339,"name":340,"sourceUrl":341,"tags":342},"Skills for designing and building MCP servers that work seamlessly with Claude. Guides you through deployment models (remote HTTP, MCPB, local), tool design patterns, auth, and interactive MCP apps.",{},"MCP Server Development Suite","https://github.com/anthropics/claude-plugins-official/tree/HEAD/plugins/mcp-server-dev",[308,343,344,345,309,346,15,217],"server","development","typescript","documentation",{"githubOwner":348,"githubRepo":349,"locale":25,"slug":350,"type":217},"anthropics","claude-plugins-official","mcp-server-dev",{"extract":352,"llm":355,"smithery":357},{"commitSha":353,"license":354},"06f52cd3ac3e47ecb45228a86183ea2a86e9d6ff","Apache-2.0",{"promptVersionExtension":194,"promptVersionScoring":195,"score":356,"targetMarket":200,"tier":201},98,{"qualityScore":8,"totalActivations":8,"uniqueUsers":8,"useCount":8,"verified":209},{"parentExtensionId":359,"repoId":360},"k171b9714j6pgfxqht22y94q4x866sck","kd798hf3w99qz2xt1fqtgq7gf9865e31",{"anyEnrichmentAt":362,"extractAt":363,"githubAt":364,"llmAt":365,"smitheryAt":362,"updatedAt":365},1778054509977,1778054452948,1778054454391,1778054703946,{"_creationTime":367,"_id":368,"community":369,"display":370,"identity":383,"providers":387,"relations":391,"workflow":394},1778053078370.9038,"k17b5xsd2g2113z1wvtzcry55d866avy",{"reviewCount":8},{"description":371,"installMethods":372,"name":373,"sourceUrl":374,"tags":375},"Complete Git expertise for ALL operations with 2025 features (Git 2.49+, GitHub CLI 2.x). PROACTIVELY activate for: (1) ANY Git task, (2) Git 2.49+ features (git-backfill, path-walk API, reftables, sparse-checkout, worktrees), (3) Security (signed commits, zero-trust, secret scanning, CodeQL), (4) Trunk-Based Development, (5) GitHub CLI 2.x (Copilot CLI, model evaluations), (6) GitHub Actions 2025 (1 vCPU runners, immutable releases), (7) Modern workflows (monorepo, parallel development), (8) History rewriting/recovery. Provides: Git 2.49 git-backfill for partial clones, path-walk API, reftables migration, sparse-checkout (90% space reduction), worktrees, GitHub Copilot CLI, gh models eval, zero-trust security, signed commits (GPG/SSH), GitHub Actions 2025 features, automatic backups, safety guardrails, reflog recovery.",{},"Git Master Plugin","https://github.com/josiahsiegel/claude-plugin-marketplace/tree/HEAD/plugins/git-master",[376,377,378,288,379,380,15,381,382],"git","version-control","devops","windows","bash","workflow","recovery",{"githubOwner":384,"githubRepo":385,"locale":25,"slug":386,"type":217},"josiahsiegel","claude-plugin-marketplace","git-master",{"extract":388,"llm":390},{"commitSha":389,"license":242},"a05d923c8a3551d4274eef152649583d693b9b67",{"promptVersionExtension":194,"promptVersionScoring":195,"score":356,"targetMarket":200,"tier":201},{"parentExtensionId":392,"repoId":393},"k1741p5y8fyyp90j4zdea56w61867nj3","kd75az366mhppxzk11c689vzen865qkv",{"anyEnrichmentAt":395,"extractAt":396,"githubAt":395,"llmAt":397,"updatedAt":397},1778053080008,1778053078370,1778053164925,{"_creationTime":399,"_id":400,"community":401,"display":402,"identity":414,"providers":418,"relations":423,"workflow":426},1778053176705.3918,"k178k4yyhwd7nvhrwp011vb5yh8675t8",{"reviewCount":8},{"description":403,"installMethods":404,"name":405,"sourceUrl":406,"tags":407},"Terraform code generation skills including HCL generation, style guides, and testing.",{},"Terraform Code Generation","https://github.com/hashicorp/agent-skills/tree/HEAD/terraform/code-generation",[408,409,410,411,412,413,17,308],"terraform","hcl","code-generation","style-guide","testing","iac",{"githubOwner":415,"githubRepo":416,"locale":25,"slug":417,"type":217},"hashicorp","agent-skills","terraform-code-generation",{"extract":419,"llm":422},{"commitSha":420,"license":421},"b129bb5c0a8d857d5c36d1fd12492e943730aacf","MPL-2.0",{"promptVersionExtension":194,"promptVersionScoring":195,"score":356,"targetMarket":200,"tier":201},{"parentExtensionId":424,"repoId":425},"k17033n6byjh41pfnm05s0ahth866t04","kd74k31qknmr6efdnd1z174e15864srx",{"anyEnrichmentAt":427,"extractAt":428,"githubAt":427,"llmAt":429,"updatedAt":429},1778053177133,1778053176705,1778053201737,{"_creationTime":431,"_id":432,"community":433,"display":434,"identity":445,"providers":447,"relations":453,"workflow":456},1778053881467.4116,"k17fqj5kcs4y7wnhfa96a6d4k9866312",{"reviewCount":8},{"description":435,"installMethods":436,"name":437,"sourceUrl":438,"tags":439},"Optimize business operations — vendor management, process documentation, change management, capacity planning, and compliance tracking. Keep your organization running efficiently.",{},"Operations Plugin","https://github.com/anthropics/knowledge-work-plugins/tree/HEAD/operations",[440,381,308,441,442,17,443,444],"operations","vendor-management","process-documentation","capacity-planning","change-management",{"githubOwner":348,"githubRepo":446,"locale":25,"slug":440,"type":217},"knowledge-work-plugins",{"extract":448,"llm":450,"smithery":452},{"commitSha":449,"license":354},"9789ea78ad66e395a9c709146cacecdc14ce2abf",{"promptVersionExtension":194,"promptVersionScoring":195,"score":451,"targetMarket":200,"tier":201},97,{"qualityScore":8,"totalActivations":8,"uniqueUsers":8,"useCount":8,"verified":209},{"parentExtensionId":454,"repoId":455},"k17a976hfb9h5wyrvbw5572nvs867hs3","kd7a7vj5tkj2ssjqcbwka5sh0x864wea",{"anyEnrichmentAt":457,"extractAt":458,"githubAt":459,"llmAt":460,"smitheryAt":457,"updatedAt":460},1778053907346,1778053881467,1778053882262,1778053992763]