Full-stack-skills tauri-security
Configure Tauri v2 capabilities, scoped access rules, and ACL-based permission control for production apps. Use when generating capabilities/default.json, defining scoped access per plugin, or auditing permissions for minimum-privilege compliance.
install
source · Clone the upstream repo
git clone https://github.com/partme-ai/full-stack-skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/partme-ai/full-stack-skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/tauri-skills/tauri-security" ~/.claude/skills/partme-ai-full-stack-skills-tauri-security && rm -rf "$T"
manifest:
skills/tauri-skills/tauri-security/SKILL.mdsource content
When to use this skill
ALWAYS use this skill when the user mentions:
- Capability or scope design for Tauri v2
- Building or editing capabilities/default.json
- ACL-based permission control or audit
Trigger phrases include:
- "capabilities", "scope", "ACL", "permissions", "capabilities json", "minimum privilege"
How to use this skill
- Create capabilities/default.json in
:src-tauri/capabilities/{ "identifier": "default", "description": "Main window capabilities", "windows": ["main"], "permissions": [ "core:default", "dialog:allow-open", { "identifier": "fs:allow-read-text-file", "allow": [{ "path": "$APPDATA/**" }] }, { "identifier": "http:default", "allow": [{ "url": "https://api.example.com/**" }] } ] } - Map features to capabilities: Each feature should use the minimum permissions required
- Define scoped access to restrict file paths, URLs, and other resources:
{ "identifier": "fs:allow-write-text-file", "allow": [{ "path": "$APPDATA/config/**" }] } - Assign capabilities per window -- different windows can have different permission sets
- Audit permissions before release: remove any unused permissions, verify scope restrictions
- Validate at runtime by testing that restricted operations correctly fail outside their scope
Outputs
- capabilities/default.json with minimal permissions
- Feature-to-capability mapping
- Scoped access rules for files, URLs, and plugins
- Permission audit checklist
References
Keywords
tauri security, capabilities, scope, ACL, permissions, minimum privilege