Claude-skill-registry admin-windows
install
source · Clone the upstream repo
git clone https://github.com/majiayu000/claude-skill-registry
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/majiayu000/claude-skill-registry "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/data/admin-windows" ~/.claude/skills/majiayu000-claude-skill-registry-admin-windows && rm -rf "$T"
manifest:
skills/data/admin-windows/SKILL.mdsafety · automated scan (medium risk)
This is a pattern-based risk scan, not a security review. Our crawler flagged:
- pip install
- makes HTTP requests (curl)
Always read a skill's source content before installing. Patterns alone don't mean the skill is malicious — but they warrant attention.
source content
Windows Administration
Requires: Windows platform, PowerShell 7.x
Profile-First Approach
Always load profile before operations:
. $HOME/.admin/scripts/Load-Profile.ps1 # Or from admin skill Load-AdminProfile -Export
Then check preferences before suggesting commands:
# User wants to install a package $preferredManager = $AdminProfile.preferences.packages.manager # Returns: "scoop" or "winget" or "chocolatey"
Package Installation (Profile-Aware)
Check Preference First
$pkgMgr = $AdminProfile.preferences.packages.manager switch ($pkgMgr) { "scoop" { scoop install $package } "winget" { winget install $package } "choco" { choco install $package -y } default { winget install $package } }
Quick Reference by Manager
| Manager | Install | Update | List |
|---|---|---|---|
| scoop | | | |
| winget | | | |
| choco | | | |
Python Commands (Profile-Aware)
Check profile first:
$pyMgr = $AdminProfile.preferences.python.manager # Returns: "uv", "pip", "conda", "poetry"
| Profile Says | Instead of | Use |
|---|---|---|
| ❌ | |
| ✅ | |
| ❌ | |
| ❌ | |
Node Commands (Profile-Aware)
$nodeMgr = $AdminProfile.preferences.node.manager # Returns: "npm", "pnpm", "yarn", "bun"
| Profile Says | Instead of | Use |
|---|---|---|
| ✅ | |
| ❌ | |
| ❌ | |
| ❌ | |
Bash to PowerShell Translation
| Bash | PowerShell | Notes |
|---|---|---|
| | Or |
| | |
| | |
| | |
| | Or |
| | |
| | |
| | |
| | Session only |
(perm) | | |
| | |
| | |
| | |
| | |
| | |
| | |
| / |
PATH Operations
Check Tool Path from Profile
# Instead of searching, use profile $gitPath = $AdminProfile.tools.git.path # Returns: "C:/Program Files/Git/mingw64/bin/git.exe"
Add to PATH (Permanent)
$newPath = "C:/new/path" $currentPath = [Environment]::GetEnvironmentVariable('PATH', 'User') if ($currentPath -notlike "*$newPath*") { [Environment]::SetEnvironmentVariable('PATH', "$newPath;$currentPath", 'User') } # Refresh session $env:PATH = [Environment]::GetEnvironmentVariable('PATH', 'User') + ";" + [Environment]::GetEnvironmentVariable('PATH', 'Machine')
Environment Variables
From Profile
# Key paths are in profile $AdminProfile.paths.sshKeys # C:/Users/Owner/.ssh $AdminProfile.paths.npmGlobal # C:/Users/Owner/AppData/Roaming/npm $AdminProfile.paths.projects # D:/
Set Permanent Variable
[Environment]::SetEnvironmentVariable("MY_VAR", "value", "User")
Check Tool Status
Before installing, check profile:
$tool = Get-AdminTool "docker" if ($tool.present -and $tool.installStatus -eq "working") { Write-Host "Docker already installed: $($tool.version)" } else { # Install using preferred manager $mgr = $AdminProfile.preferences.packages.manager # ... install logic }
After Installation
Update profile:
$AdminProfile.tools["newtool"] = @{ present = $true version = "1.0.0" installedVia = $AdminProfile.preferences.packages.manager path = (Get-Command newtool).Source installStatus = "working" lastChecked = (Get-Date).ToString("o") } # Add to history $AdminProfile.history += @{ date = (Get-Date).ToString("o") action = "install" tool = "newtool" method = $AdminProfile.preferences.packages.manager status = "success" } # Save $AdminProfile | ConvertTo-Json -Depth 10 | Set-Content $AdminProfile.paths.deviceProfile
Execution Policy
# Check Get-ExecutionPolicy -List # Set for current user (recommended) Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUser # Bypass for single script powershell -ExecutionPolicy Bypass -File script.ps1
PowerShell Profile
Location:
$AdminProfile.preferences.shell.profilePath
# Edit notepad $PROFILE # Recommended: Source admin profile loader . "$HOME\.admin\scripts\Load-Profile.ps1" Load-AdminProfile -Export -Quiet
Capabilities Check
Before operations, verify capabilities:
if (-not (Test-AdminCapability "canRunPowershell")) { Write-Error "PowerShell not available" return } if (Test-AdminCapability "hasDocker") { # Docker operations safe }
Related Skills
| Task | Route To |
|---|---|
| WSL operations | |
| MCP servers | |
| Server provisioning | |
| Profile management | |
References
- Troubleshooting, known issuesreferences/OPERATIONS.md