[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"extension-skill-yurukusa-safety-setup-en":3,"guides-for-yurukusa-safety-setup":457,"similar-k1705szwze4ad0reczcfvzfqs186mdv9-en":458},{"_creationTime":4,"_id":5,"children":6,"community":7,"display":9,"evaluation":15,"identity":305,"isFallback":289,"parentExtension":310,"providers":340,"relations":344,"repo":345,"tags":454,"workflow":455},1778699381979.869,"k1705szwze4ad0reczcfvzfqs186mdv9",[],{"reviewCount":8},0,{"description":10,"installMethods":11,"name":13,"sourceUrl":14},"Safety hooks for Claude Code — 695 pre-built hooks that prevent file deletion, credential leaks, git disasters, and token waste during autonomous AI coding sessions. Install with npx cc-safe-setup.",{"claudeCode":12},"yurukusa/cc-safe-setup","cc-safe-setup","https://github.com/yurukusa/cc-safe-setup",{"_creationTime":16,"_id":17,"extensionId":5,"locale":18,"result":19,"trustSignals":287,"workflow":303},1778699495586.9897,"kn7eee0dwp94m18t7q3zhc5m8s86mnxe","en",{"checks":20,"evaluatedAt":255,"extensionSummary":256,"features":257,"nonGoals":264,"promptVersionExtension":268,"promptVersionScoring":269,"purpose":270,"rationale":271,"score":272,"summary":273,"tags":274,"targetMarket":280,"tier":281,"useCases":282},[21,26,29,32,36,39,43,46,50,54,58,61,64,68,72,76,79,82,85,88,92,96,99,103,106,109,112,115,118,121,125,128,132,136,140,143,147,151,155,159,163,166,169,172,175,177,180,183,186,189,191,193,195,197,199,201,203,205,207,209,211,213,215,217,219,221,224,225,227,231,233,235,237,239,241,243,245,247,249,251,253],{"category":22,"check":23,"severity":24,"summary":25},"Practical Utility","Problem relevance","pass","The description clearly states the problem of preventing file deletion, credential leaks, git disasters, and token waste during autonomous AI coding sessions.",{"category":22,"check":27,"severity":24,"summary":28},"Unique selling proposition","The extension offers value beyond simple prompt engineering by providing enforced, system-level hooks that prevent dangerous operations, unlike CLAUDE.md rules which can be forgotten.",{"category":22,"check":30,"severity":24,"summary":31},"Production readiness","The extension provides a complete lifecycle solution for enhancing AI coding safety, from installation to ongoing hook management and diagnostics.",{"category":33,"check":34,"severity":24,"summary":35},"Scope","Single responsibility principle","The extension focuses on safety hooks for Claude Code, addressing a single domain of risk mitigation.",{"category":33,"check":37,"severity":24,"summary":38},"Description quality","The displayed description accurately reflects the extension's purpose and installation method.",{"category":40,"check":41,"severity":24,"summary":42},"Invocation","Precise Purpose","The description clearly names the artifact (Claude Code environment) and the user intent (preventing accidents during autonomous coding).",{"category":40,"check":44,"severity":24,"summary":45},"Concise Frontmatter","The frontmatter is concise and effectively summarizes the core capability and installation method.",{"category":47,"check":48,"severity":24,"summary":49},"Documentation","Concise Body","The SKILL.md body is well-structured with clear sections and delegates deeper material to linked resources, keeping the main content focused.",{"category":51,"check":52,"severity":24,"summary":53},"Context","Progressive Disclosure","Deeper material and extensive lists of hooks are linked to separate files and external resources, following a progressive disclosure pattern.",{"category":51,"check":55,"severity":56,"summary":57},"Forked exploration","not_applicable","This skill does not involve deep exploration or code review that would necessitate forked context.",{"category":22,"check":59,"severity":24,"summary":60},"Usage examples","Sufficient end-to-end examples are provided, demonstrating installation and individual hook usage, with clear expected outcomes.",{"category":22,"check":62,"severity":24,"summary":63},"Edge cases","The documentation addresses various failure modes, limitations (e.g., `--dangerously-skip-permissions`), and provides recovery steps or workarounds.",{"category":65,"check":66,"severity":56,"summary":67},"Code Execution","Tool Fallback","The skill does not appear to rely on external MCP servers or custom tools that would require fallbacks.",{"category":69,"check":70,"severity":24,"summary":71},"Safety","Halt on unexpected state","The documentation implies hooks halt dangerous operations, and the `--doctor` command helps diagnose issues, indirectly addressing unexpected states.",{"category":73,"check":74,"severity":24,"summary":75},"Portability","Cross-skill coupling","The skill is self-contained and does not appear to implicitly rely on other skills.",{"category":33,"check":77,"severity":24,"summary":78},"Scoped tools","The extension provides specific hooks (e.g., `prevent-rm-rf`) rather than a single generalist command, ensuring precise application.",{"category":47,"check":80,"severity":24,"summary":81},"Configuration & parameter reference","Configuration variables and their effects are documented, along with default values and guidance on safety profiles.",{"category":33,"check":83,"severity":24,"summary":84},"Tool naming","The names of individual hooks and commands (e.g., `destructive-guard`, `--audit`) are descriptive and domain-relevant.",{"category":33,"check":86,"severity":24,"summary":87},"Minimal I/O surface","Hooks are designed to intercept specific commands and actions, minimizing unnecessary data processing or return values beyond their safety mandate.",{"category":89,"check":90,"severity":24,"summary":91},"License","License usability","The extension is licensed under MIT, a permissive open-source license, and this is clearly stated in the repository.",{"category":93,"check":94,"severity":24,"summary":95},"Maintenance","Commit recency","The repository shows recent commits, indicating active maintenance.",{"category":93,"check":97,"severity":24,"summary":98},"Dependency Management","The extension has zero npm dependencies and relies on `jq`, which is a common utility and can be installed via package managers, indicating good dependency management.",{"category":100,"check":101,"severity":24,"summary":102},"Security","Secret Management","The extension actively guards against secret leaks by preventing `.env` files from being committed or read by AI, and has specific hooks for credential protection.",{"category":100,"check":104,"severity":24,"summary":105},"Injection","The hooks are designed to intercept and validate commands, preventing execution of arbitrary or malicious instructions from external sources.",{"category":100,"check":107,"severity":24,"summary":108},"Transitive Supply-Chain Grenades","The extension is self-contained and does not fetch external content at runtime that could introduce supply-chain risks.",{"category":100,"check":110,"severity":24,"summary":111},"Sandbox Isolation","The hooks operate at the process level within the user's environment to enforce safety, complementing sandbox environments without attempting to escape them.",{"category":100,"check":113,"severity":24,"summary":114},"Sandbox escape primitives","No evidence of detached-process spawns or deny-retry loops that could facilitate sandbox escapes.",{"category":100,"check":116,"severity":24,"summary":117},"Data Exfiltration","The extension focuses on preventing data exfiltration by blocking dangerous commands and credential leaks, rather than facilitating them.",{"category":100,"check":119,"severity":24,"summary":120},"Hidden Text Tricks","The bundled content appears free of hidden-steering tricks and control characters.",{"category":122,"check":123,"severity":24,"summary":124},"Hooks","Opaque code execution","The hook scripts are provided as readable shell scripts, without obfuscation like base64 encoding or runtime fetches.",{"category":73,"check":126,"severity":24,"summary":127},"Structural Assumption","The hooks are designed to be installed globally (`~/.claude/`) and operate on commands, minimizing assumptions about project-specific directory structures.",{"category":129,"check":130,"severity":24,"summary":131},"Trust","Issues Attention","With 1 open and 1 closed issue in the last 90 days, the maintainer shows good engagement.",{"category":133,"check":134,"severity":24,"summary":135},"Versioning","Release Management","The extension has a meaningful semver version declared in its package.json and displayed on npm.",{"category":137,"check":138,"severity":24,"summary":139},"Execution","Pinned dependencies","The extension has no third-party npm dependencies and relies on `jq`, which is a common system utility.",{"category":33,"check":141,"severity":24,"summary":142},"Dry-run preview","The `--dry-run` command is available, allowing users to preview changes before installing hooks.",{"category":144,"check":145,"severity":56,"summary":146},"Protocol","Idempotent retry & timeouts","The extension provides hooks to intercept commands, not remote calls or state-changing operations that would require idempotency or timeouts.",{"category":148,"check":149,"severity":24,"summary":150},"Compliance","Telemetry opt-in","The extension does not appear to emit telemetry by default; any diagnostic tools are explicitly invoked by the user.",{"category":152,"check":153,"severity":24,"summary":154},"Install","Installation instruction","Clear installation instructions with copy-pasteable commands are provided in the README and SKILL.md.",{"category":156,"check":157,"severity":24,"summary":158},"Errors","Actionable error messages","The `--doctor` command and troubleshooting guide provide actionable steps for diagnosing and resolving issues.",{"category":33,"check":160,"severity":161,"summary":162},"Tool surface size","warning","The extension exposes a large number of commands (49 listed), which could potentially lead to confusion or precise invocation challenges.",{"category":40,"check":164,"severity":24,"summary":165},"Overlapping near-synonym tools","The commands are generally distinct and serve specific purposes, avoiding significant overlap in functionality.",{"category":47,"check":167,"severity":24,"summary":168},"Phantom features","All advertised features and hooks appear to have corresponding implementations or clear documentation.",{"category":100,"check":170,"severity":24,"summary":171},"Unguarded Destructive Operations","Destructive operations are heavily guarded by default, with confirmation prompts or blocking mechanisms implemented through hooks.",{"category":65,"check":173,"severity":24,"summary":174},"Error Handling","The extension provides troubleshooting tools (`--doctor`) and detailed documentation for diagnosing issues, indicating robust error handling.",{"category":100,"check":116,"severity":24,"summary":176},"The extension's primary goal is to prevent data exfiltration and credential leaks, not facilitate them.",{"category":148,"check":178,"severity":56,"summary":179},"GDPR","The extension does not appear to operate on personal data; its function is command interception and validation.",{"category":148,"check":181,"severity":24,"summary":182},"Target market","The extension is globally applicable and does not exhibit any regional or jurisdictional limitations.",{"category":73,"check":184,"severity":24,"summary":185},"Runtime stability","The extension provides clear guidance for Windows users (WSL/Git Bash) and addresses potential issues like `jq` pathing.",{"category":47,"check":187,"severity":24,"summary":188},"README","The README file is comprehensive, clearly states the extension's purpose, and provides extensive documentation and examples.",{"category":100,"check":104,"severity":24,"summary":190},"The hooks act as a defense layer, intercepting commands and preventing the execution of injected malicious code.",{"category":100,"check":113,"severity":24,"summary":192},"No mechanisms for detached processes or retry loops around denied calls were observed.",{"category":100,"check":119,"severity":24,"summary":194},"The code and documentation appear free of hidden characters or obfuscation techniques.",{"category":144,"check":145,"severity":56,"summary":196},"The nature of the hooks as command interceptors does not involve remote calls requiring idempotency or timeouts.",{"category":100,"check":116,"severity":24,"summary":198},"The extension actively prevents data exfiltration by blocking dangerous commands and credential leaks.",{"category":100,"check":119,"severity":24,"summary":200},"No hidden text tricks or obfuscation were found in the provided documentation or scripts.",{"category":122,"check":123,"severity":24,"summary":202},"The hook scripts are provided in plain, readable shell script format.",{"category":73,"check":126,"severity":24,"summary":204},"Hooks are installed globally, minimizing project-specific structural assumptions.",{"category":129,"check":130,"severity":24,"summary":206},"With 1 open and 1 closed issue in the last 90 days, engagement is good.",{"category":133,"check":134,"severity":24,"summary":208},"A meaningful semver version is available, and the project is actively maintained.",{"category":137,"check":138,"severity":24,"summary":210},"No external dependencies are used, relying only on `jq` which is a common utility.",{"category":33,"check":141,"severity":24,"summary":212},"A `--dry-run` option is available to preview changes.",{"category":144,"check":145,"severity":56,"summary":214},"The extension's functionality does not involve remote calls requiring idempotency or timeouts.",{"category":148,"check":149,"severity":24,"summary":216},"Telemetry is strictly opt-in, with diagnostic tools requiring explicit user invocation.",{"category":152,"check":153,"severity":24,"summary":218},"Clear and comprehensive installation instructions are provided, including an interactive wizard and individual hook installation options.",{"category":156,"check":157,"severity":24,"summary":220},"Troubleshooting commands and documentation provide clear steps for diagnosing and resolving issues.",{"category":137,"check":222,"severity":24,"summary":223},"Validation","The hooks intercept commands and validate them against predefined safety rules, ensuring proper input handling.",{"category":100,"check":170,"severity":24,"summary":171},{"category":65,"check":173,"severity":24,"summary":226},"Troubleshooting tools and detailed documentation facilitate the diagnosis and resolution of hook-related issues.",{"category":65,"check":228,"severity":229,"summary":230},"Logging","info","While not explicitly detailing a separate audit log file, the `--watch` and `--replay` commands provide a mechanism to review blocked commands, acting as a form of logging for safety events.",{"category":148,"check":178,"severity":56,"summary":232},"The extension's purpose does not involve processing personal data.",{"category":148,"check":181,"severity":24,"summary":234},"The extension is designed for a global audience and has no regional restrictions.",{"category":73,"check":184,"severity":24,"summary":236},"The extension provides specific guidance for Windows users and addresses potential runtime environment issues.",{"category":47,"check":187,"severity":24,"summary":238},"The README is extensive, detailed, and accurately reflects the extension's capabilities and usage.",{"category":40,"check":164,"severity":24,"summary":240},"Commands are well-differentiated, avoiding redundancy.",{"category":47,"check":167,"severity":24,"summary":242},"All advertised features have corresponding implementations or documentation.",{"category":100,"check":170,"severity":24,"summary":244},"Destructive operations are guarded by default through hooks.",{"category":65,"check":173,"severity":24,"summary":246},"The extension provides robust error handling and troubleshooting capabilities.",{"category":65,"check":228,"severity":229,"summary":248},"While not a traditional audit log, `--watch` and `--replay` provide visibility into blocked commands.",{"category":148,"check":178,"severity":56,"summary":250},"The extension does not handle personal data.",{"category":148,"check":181,"severity":24,"summary":252},"The extension is globally applicable.",{"category":73,"check":184,"severity":24,"summary":254},"Clear guidance is provided for different operating systems and environments.",1778699495462,"This extension provides a set of safety hooks for Claude Code to prevent dangerous operations like file deletion, credential leaks, and git disasters during autonomous AI coding sessions. It installs pre-built hooks that run before or after tool calls to block risky actions.",[258,259,260,261,262,263],"Install pre-built safety hooks","Prevent file deletion and overwrites","Guard against credential leaks","Block dangerous git operations","Optimize token usage","Provide diagnostic and audit tools",[265,266,267],"Replacing core Claude Code functionality","Directly managing code quality beyond safety checks","Providing general-purpose code generation capabilities","3.0.0","4.4.0","To significantly enhance the safety and reliability of autonomous AI coding sessions by preventing common operational errors and security vulnerabilities.","High score due to comprehensive safety features, excellent documentation, and active maintenance. The warning for 'Tool surface size' is minor given the specific domain of safety hooks.",98,"Robust safety hooks for AI coding agents, preventing common and critical operational risks.",[275,276,277,278,279],"safety","security","automation","ai-agent","code-quality","global","community",[283,284,285,286],"Securing autonomous AI coding sessions","Preventing accidental data loss during AI operations","Mitigating security risks like credential exposure","Ensuring safe Git operations in AI-driven workflows",{"codeQuality":288,"collectedAt":290,"documentation":291,"maintenance":294,"popularity":299,"security":301,"testCoverage":302},{"hasLockfile":289},false,1778699476283,{"descriptionLength":292,"readmeSize":293},197,59332,{"closedIssues90d":295,"forks":295,"hasChangelog":296,"openIssues90d":295,"pushedAt":297,"stars":298},1,true,1778692307000,25,{"npmDownloads":300},910,{"hasNpmPackage":296,"smitheryVerified":289},{"hasCi":296,"hasTests":296},{"updatedAt":304},1778699495587,{"basePath":306,"githubOwner":307,"githubRepo":13,"locale":18,"slug":308,"type":309},"skills/safety-setup","yurukusa","safety-setup","skill",{"_creationTime":311,"_id":312,"community":313,"display":314,"identity":317,"parentExtension":320,"providers":321,"relations":333,"tags":335,"workflow":336},1778699381979.8687,"k178wjnjd4vs7xhw95cq04689n86nhkt",{"reviewCount":8},{"description":315,"installMethods":316,"name":13,"sourceUrl":14},"734 safety hooks for Claude Code — prevent file deletion, credential leaks, git disasters, and token waste during autonomous AI coding sessions",{"claudeCode":13},{"basePath":318,"githubOwner":307,"githubRepo":13,"locale":18,"slug":13,"type":319},"","plugin",null,{"evaluate":322,"extract":328},{"promptVersionExtension":268,"promptVersionScoring":269,"score":323,"tags":324,"targetMarket":280,"tier":327},99,[276,325,275,279,326],"hooks","cli","verified",{"commitSha":329,"license":330,"plugin":331},"HEAD","MIT",{"mcpCount":8,"provider":332,"skillCount":295},"classify",{"repoId":334},"kd75r9w9e5zg6a7p0g22f0n1td86nsat",[326,279,325,275,276],{"evaluatedAt":337,"extractAt":338,"updatedAt":339},1778699475909,1778699381979,1778699577905,{"evaluate":341,"extract":343},{"promptVersionExtension":268,"promptVersionScoring":269,"score":272,"tags":342,"targetMarket":280,"tier":281},[275,276,277,278,279],{"commitSha":329},{"parentExtensionId":312,"repoId":334},{"_creationTime":346,"_id":334,"identity":347,"providers":348,"workflow":449},1778699372493.5012,{"githubOwner":307,"githubRepo":13,"sourceUrl":14},{"classify":349,"discover":424,"extract":427,"github":428,"npm":448},{"commitSha":329,"extensions":350},[351,363,372,380,388,396,408,414],{"basePath":318,"description":352,"displayName":13,"installMethods":353,"rationale":354,"selectedPaths":355,"source":361,"sourceLanguage":18,"type":362},"Safety hooks for Claude Code — 734 battle-tested hooks from 800+ hours of autonomous operation. Prevents rm -rf, force-push, credential leaks, unauthorized fund transfers, deny-rules bypass, and more.",{"claudeCode":12},"marketplace.json at .claude-plugin/marketplace.json",[356,359],{"path":357,"priority":358},".claude-plugin/marketplace.json","mandatory",{"path":360,"priority":358},"README.md","rule","marketplace",{"basePath":364,"description":365,"displayName":366,"installMethods":367,"license":330,"rationale":368,"selectedPaths":369,"source":361,"sourceLanguage":18,"type":319},"plugins/safety-essentials","5 essential safety hooks for Claude Code. Blocks rm -rf, force-push, hard-reset, .env overwrites, and package publish. The minimum viable safety net from 800+ hours of autonomous operation.","safety-essentials",{"claudeCode":366},"plugin manifest at plugins/safety-essentials/.claude-plugin/plugin.json",[370],{"path":371,"priority":358},".claude-plugin/plugin.json",{"basePath":373,"description":374,"displayName":375,"installMethods":376,"license":330,"rationale":377,"selectedPaths":378,"source":361,"sourceLanguage":18,"type":319},"plugins/git-protection","Git safety hooks for Claude Code. Blocks force-push, protects main/master branch, prevents hard-reset, guards interactive rebase, and blocks git clean -fd.","git-protection",{"claudeCode":375},"plugin manifest at plugins/git-protection/.claude-plugin/plugin.json",[379],{"path":371,"priority":358},{"basePath":381,"description":382,"displayName":383,"installMethods":384,"license":330,"rationale":385,"selectedPaths":386,"source":361,"sourceLanguage":18,"type":319},"plugins/credential-guard","Protect secrets and credentials from Claude Code. Blocks writes to .env files, detects API keys in shell commands, prevents hardcoded tokens, and guards service account JSON files.","credential-guard",{"claudeCode":383},"plugin manifest at plugins/credential-guard/.claude-plugin/plugin.json",[387],{"path":371,"priority":358},{"basePath":389,"description":390,"displayName":391,"installMethods":392,"license":330,"rationale":393,"selectedPaths":394,"source":361,"sourceLanguage":18,"type":319},"plugins/token-guard","Token consumption guards for Claude Code. Warns on large file reads (100KB+), limits unique file reads per session, estimates token budget, and caps subagent spawns. From 800+ hours of autonomous operation data.","token-guard",{"claudeCode":391},"plugin manifest at plugins/token-guard/.claude-plugin/plugin.json",[395],{"path":371,"priority":358},{"basePath":318,"description":315,"displayName":13,"installMethods":397,"license":330,"rationale":398,"selectedPaths":399,"source":361,"sourceLanguage":18,"type":319},{"claudeCode":13},"plugin manifest at .claude-plugin/plugin.json",[400,401,402,405],{"path":371,"priority":358},{"path":360,"priority":358},{"path":403,"priority":404},"skills/safety-setup/SKILL.md","medium",{"path":406,"priority":407},"hooks/hooks.json","high",{"basePath":306,"description":10,"displayName":13,"installMethods":409,"rationale":410,"selectedPaths":411,"source":361,"sourceLanguage":18,"type":309},{"claudeCode":12},"SKILL.md frontmatter at skills/safety-setup/SKILL.md",[412],{"path":413,"priority":358},"SKILL.md",{"basePath":318,"description":415,"displayName":13,"installMethods":416,"license":330,"rationale":417,"selectedPaths":418,"source":361,"sourceLanguage":18,"type":326},"One command to make Claude Code safe. 727 example hooks + 8 built-in. 88 tracked incidents. 65-section Survival Guide. Token diagnosis. Works with Auto Mode.",{"npm":13},"cli ecosystem detected at /",[419,421,422],{"path":420,"priority":358},"package.json",{"path":360,"priority":358},{"path":423,"priority":404},"index.mjs",{"sources":425},[426],"manual",{"npmPackage":13},{"closedIssues90d":295,"description":429,"forks":295,"homepage":430,"openIssues90d":295,"pushedAt":297,"readmeSize":293,"stars":298,"topics":431},"One command to make Claude Code safe for autonomous operation. Prevents rm -rf, secret leaks, force-pushes, broken deployments. 715 example hooks, 9,200+ tests, 30K+ installs — built from 800+ hours of real autonomous CC operation.","https://yurukusa.github.io/cc-safe-setup/",[432,433,434,435,325,275,436,437,438,277,276,439,440,441,442,443,444,445,446,447],"ai-safety","autonomous","bash","claude-code","anthropic","claude","developer-tools","agentic-coding","coding-agent","data-loss-prevention","claude-md","claude-skills","developer-experience","claude-cli","mcp","skillsmp",{"downloads":300},{"classifiedAt":450,"discoverAt":451,"extractAt":452,"githubAt":452,"npmAt":453,"updatedAt":450},1778699381403,1778699372493,1778699376030,1778699379301,[278,277,279,275,276],{"evaluatedAt":304,"extractAt":338,"updatedAt":456},1778699578292,[],[459,488,516,543,570,598],{"_creationTime":460,"_id":461,"community":462,"display":463,"identity":469,"providers":473,"relations":481,"tags":484,"workflow":485},1778696833339.6243,"k174g80xa9zxhydbncvpf0xzy986nvx5",{"reviewCount":8},{"description":464,"installMethods":465,"name":467,"sourceUrl":468},"Delegate complex, long-running tasks to Manus AI agent for autonomous execution. Use when user says 'use manus', 'delegate to manus', 'send to manus', 'have manus do', 'ask manus', 'check manus sessions', or when tasks require deep web research, market analysis, product comparisons, stock analysis, competitive research, document generation, data analysis, or multi-step workflows that benefit from autonomous agent execution with parallel processing.",{"claudeCode":466},"sanjay3290/ai-skills","manus","https://github.com/sanjay3290/ai-skills",{"basePath":470,"githubOwner":471,"githubRepo":472,"locale":18,"slug":467,"type":309},"skills/manus","sanjay3290","ai-skills",{"evaluate":474,"extract":480},{"promptVersionExtension":268,"promptVersionScoring":269,"score":475,"tags":476,"targetMarket":280,"tier":327},100,[278,477,478,277,479],"autonomous-execution","research","api-integration",{"commitSha":329},{"parentExtensionId":482,"repoId":483},"k17es37z10n1sw6t2m3f0vsydx86mnje","kd71np0fyqg23qg8w2hcfw0h0h86nkn0",[278,479,277,477,478],{"evaluatedAt":486,"extractAt":487,"updatedAt":486},1778697107270,1778696833339,{"_creationTime":489,"_id":490,"community":491,"display":492,"identity":498,"providers":503,"relations":509,"tags":512,"workflow":513},1778698175626.3276,"k17cj6pbcgtrw523a4sw8mhcxn86mzvv",{"reviewCount":8},{"description":493,"installMethods":494,"name":496,"sourceUrl":497},"Creates custom Semgrep rules for detecting security vulnerabilities, bug patterns, and code patterns. Use when writing Semgrep rules or building custom static analysis detections.",{"claudeCode":495},"trailofbits/skills","Semgrep Rule Creator","https://github.com/trailofbits/skills",{"basePath":499,"githubOwner":500,"githubRepo":501,"locale":18,"slug":502,"type":309},"plugins/semgrep-rule-creator/skills/semgrep-rule-creator","trailofbits","skills","semgrep-rule-creator",{"evaluate":504,"extract":508},{"promptVersionExtension":268,"promptVersionScoring":269,"score":475,"tags":505,"targetMarket":280,"tier":327},[506,276,507,279,438],"semgrep","static-analysis",{"commitSha":329},{"parentExtensionId":510,"repoId":511},"k1757483sd0rdv04r5773w2tb986mb9g","kd7d5sbrd9m157hjv9c7v4wfyn86mk2f",[279,438,276,506,507],{"evaluatedAt":514,"extractAt":515,"updatedAt":514},1778699451460,1778698175626,{"_creationTime":517,"_id":518,"community":519,"display":520,"identity":526,"providers":530,"relations":536,"tags":539,"workflow":540},1778696595410.5671,"k17anj41t8hgk7k78wc98gw6a186n8ks",{"reviewCount":8},{"description":521,"installMethods":522,"name":524,"sourceUrl":525},"Prevent destructive operations using Claude Code hooks. Three modes — cautious (warn on dangerous commands), lockdown (restrict edits to one directory), and clear (remove restrictions). Uses PreToolUse matchers for Bash, Edit, and Write.",{"claudeCode":523},"rohitg00/pro-workflow","safe-mode","https://github.com/rohitg00/pro-workflow",{"basePath":527,"githubOwner":528,"githubRepo":529,"locale":18,"slug":524,"type":309},"skills/safe-mode","rohitg00","pro-workflow",{"evaluate":531,"extract":535},{"promptVersionExtension":268,"promptVersionScoring":269,"score":475,"tags":532,"targetMarket":280,"tier":327},[276,533,534,279,325],"guardrails","operations",{"commitSha":329},{"parentExtensionId":537,"repoId":538},"k17fxtjcfh5gvxdrhv2dmgn1t986mdhv","kd7am4e918eq98hrd9s31jm4vs86nn0b",[279,533,325,534,276],{"evaluatedAt":541,"extractAt":542,"updatedAt":541},1778696971063,1778696595410,{"_creationTime":544,"_id":545,"community":546,"display":547,"identity":553,"providers":557,"relations":563,"tags":565,"workflow":566},1778692607327.2307,"k17bwx69hk0p0w7rnpzvv2p16h86mp2k",{"reviewCount":8},{"description":548,"installMethods":549,"name":551,"sourceUrl":552},"Execute coding tasks with a strict delivery workflow: build a full plan, implement one step at a time, run tests continuously, and commit by default after each step (`per_step`). Support explicit commit policy overrides (`final_only`, `milestone`) and optional BDD (Given/When/Then) when users ask for behavior-driven delivery or requirements are unclear.",{"claudeCode":550},"majiayu000/vibeguard","fixflow","https://github.com/majiayu000/vibeguard",{"basePath":554,"githubOwner":555,"githubRepo":556,"locale":18,"slug":551,"type":309},"workflows/fixflow","majiayu000","vibeguard",{"evaluate":558,"extract":562},{"promptVersionExtension":268,"promptVersionScoring":269,"score":475,"tags":559,"targetMarket":280,"tier":327},[279,432,438,560,561,276],"code-generation","workflow-automation",{"commitSha":329},{"repoId":564},"kd7b0vh258xpbyerk68bk3e1ks86mk58",[432,560,279,438,276,561],{"evaluatedAt":567,"extractAt":568,"updatedAt":569},1778692812461,1778692607327,1778693059223,{"_creationTime":571,"_id":572,"community":573,"display":574,"identity":580,"providers":583,"relations":591,"tags":594,"workflow":595},1778675056600.2393,"k17ct63reqgdem6s75y0b76kn186m8xs",{"reviewCount":8},{"description":575,"installMethods":576,"name":578,"sourceUrl":579},"Pre-production audit that scans a codebase for security, database, deployment, code quality, AI/LLM, dependency, frontend, and observability issues. Intercepts deploy commands and blocks until critical items pass. Stack-agnostic. Use for \"run ship gate\", \"am I ready to ship\", \"pre-launch audit\", \"can I deploy\", \"push to production\", \"go live checklist\", \"preflight check\". Not for CI/CD setup or infra provisioning.\n",{"claudeCode":577},"alirezarezvani/claude-skills","ship-gate","https://github.com/alirezarezvani/claude-skills",{"basePath":581,"githubOwner":582,"githubRepo":443,"locale":18,"slug":578,"type":309},"engineering/skills/ship-gate","alirezarezvani",{"evaluate":584,"extract":590},{"promptVersionExtension":268,"promptVersionScoring":269,"score":475,"tags":585,"targetMarket":280,"tier":327},[276,279,586,587,588,589],"deployment","audit","checklist","devops",{"commitSha":329,"license":330},{"parentExtensionId":592,"repoId":593},"k173223hfbd6c4mx6r1jdx23wn86mbpb","kd7ff9s1w43mfyy1n7hf87816186m6px",[587,588,279,586,589,276],{"evaluatedAt":596,"extractAt":597,"updatedAt":596},1778679066333,1778675056600,{"_creationTime":599,"_id":600,"community":601,"display":602,"identity":608,"providers":611,"relations":619,"tags":621,"workflow":622},1778699438912.8826,"k170fxxh22hdspg4vr94whgj1986mpr9",{"reviewCount":8},{"description":603,"installMethods":604,"name":606,"sourceUrl":607},"Context Runtime for AI Agents — 59 MCP tools, 10 read modes, 95+ shell patterns, tree-sitter AST for 18 languages. Compresses LLM context by up to 99%. Use when reading files, running shell commands, searching code, or exploring directories. Auto-installs if not present.",{"claudeCode":605},"yvgude/lean-ctx","lean-ctx","https://github.com/yvgude/lean-ctx",{"basePath":609,"githubOwner":610,"githubRepo":606,"locale":18,"slug":606,"type":309},"skills/lean-ctx","yvgude",{"evaluate":612,"extract":618},{"promptVersionExtension":268,"promptVersionScoring":269,"score":475,"tags":613,"targetMarket":280,"tier":327},[614,278,615,438,616,617],"context-compression","cli-tools","rust","code-analysis",{"commitSha":329},{"repoId":620},"kd7dxtfr9j3z54hs3bz0218e1n86may0",[278,615,617,614,438,616],{"evaluatedAt":623,"extractAt":624,"updatedAt":625},1778699456179,1778699438912,1778699517795]