🎯

security-sandbox

🎯Skill

from adaptationio/skrillz

VibeIndex|
What it does

security-sandbox skill from adaptationio/skrillz

πŸ“¦

Part of

adaptationio/skrillz(191 items)

security-sandbox

Installation

Add MarketplaceAdd marketplace to Claude Code
/plugin marketplace add adaptationio/Skrillz
Install PluginInstall plugin from marketplace
/plugin install skrillz@adaptationio-Skrillz
Claude CodeAdd plugin in Claude Code
/plugin enable skrillz@adaptationio-Skrillz
Add MarketplaceAdd marketplace to Claude Code
/plugin marketplace add /path/to/skrillz
Install PluginInstall plugin from marketplace
/plugin install skrillz@local

+ 4 more commands

πŸ“– Extracted from docs: adaptationio/skrillz
1Installs
3
-
Last UpdatedJan 16, 2026

Skill Details

SKILL.md

Secure command execution with allowlists and validation hooks. Use when validating bash commands, configuring security policies, implementing pre-tool-use hooks, or sandboxing autonomous agent operations.

Overview

# Security Sandbox

Provides defense-in-depth security for autonomous coding operations through command validation, allowlists, and execution hooks.

Quick Start

Validate a Command

```python

from scripts.command_validator import validate_command

result = validate_command("npm install express")

if result.allowed:

# Safe to execute

pass

else:

print(f"Blocked: {result.reason}")

```

Use Security Hook

```python

from scripts.security_manager import create_bash_security_hook

hook = create_bash_security_hook()

# Hook returns decision for Claude SDK

decision = await hook({

"tool_input": {"command": "rm -rf /"}

})

# decision = {"decision": "block", "reason": "Command 'rm' requires approval"}

```

Configure Allowlist

```python

from scripts.allowlist import Allowlist

allowlist = Allowlist()

allowlist.add("docker")

allowlist.add("kubectl")

allowlist.remove("rm") # Disallow rm

```

Security Model

```

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”

β”‚ DEFENSE IN DEPTH β”‚

β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€

β”‚ β”‚

β”‚ LAYER 1: SANDBOX β”‚

β”‚ β”œβ”€ OS-level isolation β”‚

β”‚ β”œβ”€ Filesystem restrictions β”‚

β”‚ └─ Network limitations β”‚

β”‚ β”‚

β”‚ LAYER 2: PERMISSIONS β”‚

β”‚ β”œβ”€ Tool allowlist (Read, Write, Bash...) β”‚

β”‚ β”œβ”€ Path restrictions (./**) β”‚

β”‚ └─ Operation limits β”‚

β”‚ β”‚

β”‚ LAYER 3: COMMAND VALIDATION β”‚

β”‚ β”œβ”€ Command extraction & parsing β”‚

β”‚ β”œβ”€ Allowlist checking β”‚

β”‚ └─ Dangerous pattern detection β”‚

β”‚ β”‚

β”‚ LAYER 4: HOOKS β”‚

β”‚ β”œβ”€ PreToolUse validation β”‚

β”‚ β”œβ”€ Real-time blocking β”‚

β”‚ └─ Audit logging β”‚

β”‚ β”‚

β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

```

Default Allowlist

```python

ALLOWED_COMMANDS = {

# File inspection

"ls", "cat", "head", "tail", "wc", "grep", "find",

# File operations

"cp", "mkdir", "chmod", "touch",

# Node.js

"npm", "node", "npx", "yarn", "pnpm",

# Python

"python", "python3", "pip", "pip3", "poetry",

# Version control

"git",

# Process management

"ps", "lsof", "sleep", "pkill", "kill",

# System info

"pwd", "whoami", "uname", "which", "env",

# Network (limited)

"curl", "wget",

}

```

Dangerous Patterns

These patterns are always blocked:

| Pattern | Risk | Example |

|---------|------|---------|

| rm -rf / | System destruction | Wipes filesystem |

| > /dev/sda | Disk corruption | Overwrites disk |

| chmod 777 | Security hole | World-writable |

| curl \| bash | Code injection | Remote execution |

| :(){ :\|:& };: | Fork bomb | DoS attack |

| dd if=/dev/zero | Disk fill | Resource exhaustion |

Hook Integration

```python

# For Claude SDK integration

from scripts.security_manager import SecurityManager

manager = SecurityManager()

# Configure SDK with hooks

sdk_options = {

"hooks": {

"PreToolUse": [manager.pre_tool_hook]

}

}

```

Integration Points

  • autonomous-session-manager: Provides security during sessions
  • coding-agent: Uses hooks for safe command execution
  • autonomous-loop: Ensures safety in continuous operation

References

  • references/ALLOWED-COMMANDS.md - Full allowlist documentation
  • references/SECURITY-MODEL.md - Security architecture
  • references/CUSTOM-RULES.md - Custom rule configuration

Scripts

  • scripts/security_manager.py - Core security manager
  • scripts/command_validator.py - Command validation
  • scripts/allowlist.py - Allowlist management
  • scripts/sandbox_config.py - Sandbox configuration