Marketplace skill-permissions
Skill permission analysis, one-time authorization, analyze skill permissions, batch authorization
git clone https://github.com/aiskillstore/marketplace
T=$(mktemp -d) && git clone --depth=1 https://github.com/aiskillstore/marketplace "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/guo-yu/skill-permissions" ~/.claude/skills/aiskillstore-marketplace-skill-permissions && rm -rf "$T"
skills/guo-yu/skill-permissions/SKILL.mdSkill Permissions
Automatically analyze permissions required by all skills in Claude Code and generate one-time authorization commands.
Dangerous Operations Warning
This skill can modify other skill files. The following commands may cause widespread file changes:
| Command | Risk Level | Description |
|---|---|---|
| High | Batch modify all skill SKILL.md files |
| Medium | Batch modify settings.json |
| Low | Only modify settings.json |
| Safe | Read-only analysis, no file modifications |
Recommendations:
- Prefer explicit commands (e.g.,
)/skill-permissions allow port-allocator - Avoid
orinject
unless you understand the impactallow-all - Run
first to see analysis results before batch operations/skill-permissions
Usage
| Command | Description |
|---|---|
| Analyze all skills and show permission summary |
| Analyze specific skill's permission requirements |
| Execute one-time authorization for specific skill |
| Execute one-time authorization for all skills |
| Inject allow command into all skills |
| Execute one-time authorization for this skill |
How It Works
1. Permission Analysis
Scan skill's SKILL.md file, identifying patterns like:
Bash Command Patterns:
find * → Bash(find *) ls * → Bash(ls *) cat ~/.claude/* → Bash(cat ~/.claude/*) lsof -i:3* → Bash(lsof -i:3*) git * → Bash(git *) npm * → Bash(npm *)
Recognition Rules:
- Bash commands in code blocks (
)bash ... - Inline commands (
)command - Explicitly mentioned system commands
2. Permission Rule Generation
Convert identified commands to
permissions.allow rules:
{ "permissions": { "allow": [ "Bash(find * -name package.json *)", "Bash(ls -d *)", "Bash(cat ~/.claude/*)", "Bash(lsof -i:3*)" ] } }
Execution Steps
Command: /skill-permissions
/skill-permissionsAnalyze all skills and show permission summary:
-
Scan all skills
find ~/.claude/skills -name "SKILL.md" -type f 2>/dev/null -
Analyze permissions for each skill
- Read SKILL.md content
- Extract bash code blocks
- Identify command patterns
- Generate permission rules
-
Output analysis results
Command: /skill-permissions <skill-name>
/skill-permissions <skill-name>Analyze specific skill's permission requirements:
-
Locate skill
SKILL_PATH=$(find ~/.claude/skills -type d -name "<skill-name>" 2>/dev/null | head -1) -
Read and analyze SKILL.md
-
Output detailed permission list
Command: /skill-permissions allow <skill-name>
/skill-permissions allow <skill-name>Execute one-time authorization for specific skill:
- Analyze skill permission requirements
- Read existing config
- Merge permission rules (deduplicate, preserve existing rules)
- Write config file
- Output authorization result
Blocked Commands
The following command patterns are automatically blocked and won't be added to the allowlist:
Dangerous File Operations
| Command | Reason |
|---|---|
| File deletion, may cause data loss |
| Recursive force delete, extremely dangerous |
| Super user privileges |
| Opens all permissions |
Dangerous Process Operations
| Command | Reason |
|---|---|
| Force kill process |
| Kill processes by name |
| Remote code execution |
| Dynamic code execution |
Dangerous Git Operations
| Command | Reason |
|---|---|
| Force push, may overwrite remote |
| Hard reset, loses uncommitted changes |
Output Format
Analysis Result (Single Skill)
Skill: port-allocator Location: ~/.claude/skills/port-allocator Detected commands: - find ~/Codes -maxdepth 3 -name "package.json" - ls -d */ - cat ~/.claude/port-registry.json - lsof -i:3000 Generated permission rules: - Bash(find * -maxdepth * -name package.json *) - Bash(ls -d *) - Bash(cat ~/.claude/*) - Bash(lsof -i:3*) Run `/skill-permissions allow port-allocator` to authorize
Authorization Success
Permission authorization successful Skill: port-allocator Added permission rules: - Bash(find * -maxdepth * -name package.json *) - Bash(ls -d *) - Bash(cat ~/.claude/*) - Bash(lsof -i:3*) Config file: ~/.claude/settings.json New permissions take effect in next session, or run /clear to apply immediately
Configuration Files
- Permission config:
~/.claude/settings.json - Skill directory:
~/.claude/skills/
First Use
If you encounter permission prompts, first run:
/skill-permissions allow
Command: /skill-permissions allow
/skill-permissions allowExecute one-time authorization for this skill:
- Read
~/.claude/settings.json - Merge the following permissions to
:permissions.allow
{ "permissions": { "allow": [ "Bash(find ~/.claude/skills *)", "Bash(cat ~/.claude/*)" ] } }
- Write config file (preserve existing permissions)
- Output authorization result
Notes
- Conservative analysis - Only identify explicitly appearing commands, avoid over-authorization
- Deduplicated merge - New permissions merge with existing, no duplicates
- No deletion - Only adds permissions, won't delete user's existing permission config
- Wildcards - Use
to match varying parameter parts* - Session effect - Permission updates require new session or /clear to take effect
- Explicit preferred - Recommend explicit commands over batch operations to reduce risks