Claude-skill-registry config-hive-manager
Use this skill when the user needs help managing configuration storage in the Config Hive including secrets, D&R rules, YARA rules, lookups, and cloud sensors.
git clone https://github.com/majiayu000/claude-skill-registry
T=$(mktemp -d) && git clone --depth=1 https://github.com/majiayu000/claude-skill-registry "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/data/config-hive-manager" ~/.claude/skills/majiayu000-claude-skill-registry-config-hive-manager && rm -rf "$T"
skills/data/config-hive-manager/SKILL.mdLimaCharlie Config Hive Manager
This skill helps you manage configuration storage in the LimaCharlie Config Hive. Use this when users need help storing, retrieving, organizing, or managing configuration data across different hive types.
What is the Config Hive?
The Config Hive is LimaCharlie's centralized configuration storage system that allows you to store and reference various types of configuration data across your Organization. It provides:
- Centralized storage for secrets, rules, lookups, and other configurations
- Access control and permission management
- Reference capabilities through Authentication Resource Locators (ARLs)
- Version control and metadata tracking
- Infrastructure-as-Code integration
- Encrypted storage for sensitive data
The Config Hive decouples configuration from usage, enabling better security practices and easier management across multiple Organizations.
Quick Start: Store and Use a Secret
The most common Config Hive use case is storing secrets securely:
# 1. Store a secret echo "my-api-key-value" | limacharlie hive set secret --key my-api-key --data - --data-key secret # 2. Reference it in configurations using ARLs hive://secret/my-api-key
Use this ARL in adapters, outputs, or extensions:
outputs: my-output: stream: syslog dest_host: syslog.example.com secret_key: hive://secret/my-api-key
Hive Types Overview
The Config Hive supports multiple specialized storage types:
| Hive Type | Purpose | Common Usage |
|---|---|---|
| Encrypted credentials and keys | API keys, database credentials, tokens |
| Detection & Response rules | Custom D&R rules you create |
| Managed D&R rules | Third-party curated rules (e.g., Soteria) |
| YARA rules | Malware detection, file scanning |
| Lookup tables | Threat intel feeds, allow/block lists |
| Cloud sensor configs | Webhooks, virtual sensors |
| Extension configurations | Extension-specific settings |
For detailed information on each hive type, see REFERENCE.md.
Authentication Resource Locators (ARLs)
ARLs are the mechanism for referencing Config Hive data and external resources.
Hive ARL Format
Reference data stored in the Config Hive:
hive://HIVE_TYPE/KEY_NAME
Examples:
hive://secret/my-api-key hive://yara/malware-detection hive://lookup/threat-intel hive://dr-general/suspicious-process
External Resource ARLs
Reference external resources with optional authentication:
[methodName,methodDest,authType,authData]
Common Examples:
[https,my.website.com/data] [https,api.example.com/feed,bearer,hive://secret/api-token] [gcs,bucket-name/path,gaia,base64(SERVICE_KEY_JSON)] [github,username/repo/path/file.json]
For complete ARL syntax and authentication methods, see REFERENCE.md.
Common Operations
1. List Records in a Hive
limacharlie hive list HIVE_TYPE
Examples:
limacharlie hive list secret limacharlie hive list dr-general limacharlie hive list lookup
2. Get a Specific Record
limacharlie hive get HIVE_TYPE --key KEY_NAME
Example:
limacharlie hive get secret --key my-api-key
3. Create or Update a Record
limacharlie hive set HIVE_TYPE --key KEY_NAME --data FILE_PATH
Examples:
# From file limacharlie hive set secret --key my-secret --data secret.txt --data-key secret # From stdin echo "value" | limacharlie hive set secret --key my-secret --data - --data-key secret
4. Delete a Record
limacharlie hive remove HIVE_TYPE --key KEY_NAME
Example:
limacharlie hive remove secret --key old-api-key
5. Get Metadata Only
limacharlie hive get_mtd HIVE_TYPE --key KEY_NAME
This retrieves only the metadata without exposing the actual data content.
For complete CLI reference, see REFERENCE.md.
Working with Secrets
Store a Secret
# From file echo "secret-value" > secret.txt limacharlie hive set secret --key my-secret --data secret.txt --data-key secret # From stdin echo "secret-value" | limacharlie hive set secret --key my-secret --data - --data-key secret
Use a Secret
Reference secrets using ARLs:
adapters: my-adapter: type: s3 credentials: hive://secret/aws-credentials outputs: my-output: stream: syslog secret_key: hive://secret/syslog-token extensions: ext-virustotal: api_key: hive://secret/virustotal-key
Security Best Practices
- Never hardcode secrets - Always use
referenceshive://secret/ - Use descriptive names - Name secrets clearly (e.g.,
)aws-s3-readonly-key - Implement least privilege - Grant only necessary permissions
- Rotate regularly - Update secrets periodically
- Separate by environment - Use different secrets for dev/staging/prod
For more examples, see EXAMPLES.md.
Working with Lookups
Lookups are used for threat intelligence feeds, allow lists, and custom reference data.
Create a Lookup
# JSON format cat <<EOF | limacharlie hive set lookup --key threat-domains --data - { "lookup_data": { "evil.com": {"threat_level": "high"}, "phishing.net": {"threat_level": "medium"} } } EOF
Use in D&R Rules
detect: event: DNS_REQUEST op: lookup path: event/DOMAIN_NAME resource: hive://lookup/threat-domains respond: - action: report name: "Malicious domain accessed"
For more lookup examples and formats, see EXAMPLES.md.
Working with D&R Rules
Store a Rule
limacharlie hive set dr-general --key rule-name --data rule.yaml
Via Infrastructure as Code
hives: dr-general: suspicious-process: data: detect: event: NEW_PROCESS op: contains path: event/FILE_PATH value: suspicious respond: - action: report name: Suspicious Process usr_mtd: enabled: true tags: - malware-detection
For more D&R rule examples, see EXAMPLES.md.
Working with YARA Rules
Store YARA Rules
limacharlie hive set yara --key malware-rules --data rules.yara --data-key rule
Use in Commands
# Scan with hive-stored rule yara_scan hive://yara/malware-rules --pid 1234
Use in D&R Rules
respond: - action: task command: yara_scan hive://yara/malware-rules --pid "{{ .event.PROCESS_ID }}"
For more YARA examples, see EXAMPLES.md.
Access Control
Permission Model
Hive permissions follow a granular model:
- Retrieve configuration data.get
- Create or update configuration.set
- Delete configuration.del
- Get metadata only.get.mtd
- Update metadata only.set.mtd
- List available keys.list
Examples:
secret.get # Read secrets secret.set # Write secrets dr.list # List D&R rules lookup.get.mtd # Get lookup metadata only
User Metadata
All hive records support metadata for management:
usr_mtd: enabled: true # Enable/disable the record expiry: 0 # Unix timestamp (0 = never expires) tags: # Categorization tags - production - threat-intel comment: "Description" # Human-readable description
For complete permission details, see REFERENCE.md.
Infrastructure as Code Integration
Basic IaC Structure
version: 3 hives: secret: my-secret: data: secret: "value" usr_mtd: enabled: true tags: - production dr-general: my-rule: data: detect: event: NEW_PROCESS respond: - action: report usr_mtd: enabled: true
IaC Operations
# Fetch current configuration limacharlie infra fetch > config.yaml # Push configuration (additive merge) limacharlie infra push -f config.yaml # Dry run (validate without applying) limacharlie infra push -f config.yaml --dry-run # Force push (exact copy, destructive) limacharlie infra push -f config.yaml --force
For complete IaC examples and multi-org management, see EXAMPLES.md.
Best Practices
Naming Conventions
- Use kebab-case -
notmy-secret-namemySecretName - Be descriptive -
notaws-s3-readonly-credentialsaws-key - Include environment -
,prod-api-keydev-api-key - Namespace by function -
,threat-intel-virustotalthreat-intel-otx
Organization
- Tag everything - Use tags for categorization and filtering
- Add comments - Document purpose and usage in metadata
- Use consistent structure - Follow same patterns across hives
- Enable/disable - Use flags instead of deletion for testing
Security
- Never commit secrets - Never put actual secrets in IaC files
- Use hive references - Always use
ARLshive://secret/ - Rotate credentials - Regular rotation schedule
- Least privilege - Grant minimum necessary permissions
- Monitor usage - Track secret and config access
Testing
- Test in dev first - Never deploy untested configs to production
- Use dry runs - Always use
flag first--dry-run - Validate rules - Use replay service for D&R rules
- Verify ARLs - Ensure all ARLs resolve correctly
Navigation
Detailed Documentation
- REFERENCE.md - Complete hive types, ARL syntax, CLI commands, API details
- EXAMPLES.md - Common usage patterns with complete examples
- TROUBLESHOOTING.md - Common issues and solutions
Quick Reference
# List hive records limacharlie hive list HIVE_TYPE # Get a record limacharlie hive get HIVE_TYPE --key KEY # Set a record limacharlie hive set HIVE_TYPE --key KEY --data FILE # Remove a record limacharlie hive remove HIVE_TYPE --key KEY # Get metadata only limacharlie hive get_mtd HIVE_TYPE --key KEY
Common Hive Types
secret # Encrypted secrets dr-general # D&R rules yara # YARA rules lookup # Lookup tables cloudsensor # Cloud sensors extension_config # Extension configs
ARL Format
hive://HIVE_TYPE/KEY_NAME
Web UI Locations
- Secrets: Organization Settings > Secrets Manager
- D&R Rules: Automation > D&R Rules
- Lookups: Automation > Lookups
- Cloud Sensors: Sensors > Cloud Sensors
- Infrastructure as Code: Organization Settings > Infrastructure as Code
Key Reminders
- Always use
format for referenceshive://TYPE/KEY - Never hardcode secrets - use
ARLshive://secret/ - Tag and comment all hive records for organization
- Use Infrastructure as Code for version control
- Test configurations before production deployment
- Use appropriate permissions for least privilege
- Store YARA rules with
--data-key rule - Store secrets with
--data-key secret - Use dry-run before pushing IaC changes
- Enable/disable instead of delete for testing
Getting Help
When helping users with Config Hive:
- Identify the use case - Secrets, rules, lookups, etc.
- Check documentation - Refer to REFERENCE.md for technical details
- Review examples - Check EXAMPLES.md for similar patterns
- Troubleshoot issues - See TROUBLESHOOTING.md for common problems
- Encourage security - Always promote best practices
- Test first - Recommend dry-run and dev testing
This skill provides comprehensive guidance for managing the Config Hive. Always encourage proper security practices and testing before production deployment.