home / skills / outfitter-dev / agents / skills-discovery

skills-discovery skill

/plugins/outfitter/skills/skills-discovery

This skill helps you discover and evaluate community skills and plugins, assessing safety and quality before use.

npx playbooks add skill outfitter-dev/agents --skill skills-discovery

Review the files below or copy the command above to add this skill to your agents.

Files (4)
SKILL.md
7.9 KB
---
name: skills-discovery
description: Find and evaluate community skills, plugins, and marketplaces. Use when searching for existing skills, evaluating safety, or when "find skill", "discover plugin", "community skills", or "marketplace" are mentioned.
metadata:
  version: "1.0.0"
  related-skills:
    - skills-dev
    - claude-plugins
allowed-tools: Read WebFetch WebSearch Bash(gh:*)
---

# Skills Discovery

Find community skills and plugins, evaluate quality and safety before use.

<when_to_use>

- Searching for existing skills before building from scratch
- Evaluating community plugins for safety and quality
- Finding inspiration for skill design patterns
- Auditing plugins before installation

NOT for: creating new skills (use skills-dev), validating your own skills (use skills-dev)

</when_to_use>

## Discovery Workflow

1. **Search** — Find candidates via GitHub topics or code search
2. **Filter** — Apply quality heuristics to shortlist
3. **Audit** — Security review before installation
4. **Adapt** — Customize or extract patterns for your use

## GitHub Discovery

### Topic Pages

High-signal discovery starting points:

| Topic | Content | URL |
|-------|---------|-----|
| `claude-code-plugin` | Plugins | https://github.com/topics/claude-code-plugin |
| `claude-code-plugin-marketplace` | Marketplaces | https://github.com/topics/claude-code-plugin-marketplace |
| `claude-code-skills` | Skill packs | https://github.com/topics/claude-code-skills |
| `claude-code-skill` | Individual skills | https://github.com/topics/claude-code-skill |

### Code Search Patterns

Precise searches for specific artifacts:

```text
# Find SKILL.md files in .claude/skills paths
filename:SKILL.md path:.claude/skills

# Find marketplace configurations
".claude-plugin/marketplace.json"

# Find plugin manifests
".claude-plugin/plugin.json"

# Find hook configurations
"PreToolUse" AND hooks

# Find skills with specific features
filename:SKILL.md "context: fork"
filename:SKILL.md "allowed-tools"
filename:SKILL.md "disable-model-invocation"
```

### Recency Filters

Focus on actively maintained projects (adjust dates as needed):

```text
# Updated in last 90 days (calculate: date -v-90d +%Y-%m-%d)
pushed:>YYYY-MM-DD

# Updated since plugins era (Oct 2025+)
pushed:>2025-10-01
```

### Official Sources

| Source | Trust Level | Notes |
|--------|-------------|-------|
| anthropics/claude-plugins-official | High | Curated, reviewed |
| agentskills/agentskills | High | Spec + reference skills |
| platform.claude.com docs | High | Official patterns |
| Community topics | Medium | Popularity ≠ quality |
| "Awesome" lists | Low-Medium | Curated but not audited |

## Quality Heuristics

### Real Usage Signals

| Signal | Good | Suspicious |
|--------|------|------------|
| Updates | Recent commits, active issues | Stale for 6+ months |
| Stars | Steady growth | Sudden spike (star farming) |
| Issues/PRs | Open and being addressed | Many open, no responses |
| Install docs | Uses official commands | "curl \| bash" installs |
| Dependencies | Minimal, explained | Many unexplained deps |

### Content Quality

| Check | Good | Bad |
|-------|------|-----|
| Description | Clear WHAT + WHEN + TRIGGERS | Vague "helps with files" |
| `allowed-tools` | Minimal, justified | Full tool access |
| `disable-model-invocation` | Used for side effects | Missing for deploy/commit |
| Scripts | Documented, minimal | Obfuscated, complex |
| Hooks | Obvious purpose | Hidden network calls |

### Marketplaces

| Good Sign | Red Flag |
|-----------|----------|
| Version pinning | Floating branches |
| Listed sources visible | Opaque references |
| Clear update policy | Silent auto-updates |
| Curated with criteria | "Everything goes" |

## Security Audit

### Threat Model

**Installing skills/plugins = running code.** Treat with same care as npm packages.

| Surface | Risk | Mitigation |
|---------|------|------------|
| Skills with Bash | Command execution | Review `allowed-tools` |
| Hooks | Lifecycle interception | Review hook scripts |
| MCP servers | External connections | Review endpoints |
| Preprocessing `!` | Shell before thinking | Review commands |

### Audit Checklist

Before installing, review:

**For Skills:**
- [ ] Read SKILL.md frontmatter (`allowed-tools`, `disable-model-invocation`)
- [ ] Check for scripts/ directory — review any scripts
- [ ] Search for `!` `` ` `` preprocessing commands
- [ ] Verify no secrets/credentials in files

**For Plugins:**
- [ ] Read .claude-plugin/plugin.json
- [ ] Check for hooks/ — review hook scripts
- [ ] Check for .mcp.json — review MCP endpoints
- [ ] Review all referenced skill SKILL.md files

**For Hooks:**
- [ ] Understand exit code semantics (0=allow, 2=block)
- [ ] Check for network calls in hook scripts
- [ ] Verify no data exfiltration patterns

### Sandboxing

When running untrusted skills:

1. **Restrict tools** — Start with minimal `allowed-tools`, expand as needed
2. **Isolate context** — Use `context: fork` to limit blast radius
3. **Block side effects** — Add `disable-model-invocation: true` initially
4. **Monitor first run** — Watch tool calls on first execution

### Safe First Run

```markdown
# Test skill in restricted mode:
---
name: untrusted-skill-test
allowed-tools: Read, Grep, Glob  # read-only first
context: fork                     # isolated
disable-model-invocation: true   # explicit only
---
```

Expand permissions only after reviewing behavior.

## Use Case Catalog

Common skill categories with examples (for inspiration, not endorsement):

### Workflow Automation

| Pattern | What It Does | Key Features |
|---------|--------------|--------------|
| PR workflows | Summarize, review, update PRs | Preprocessing with `gh` |
| Issue pipelines | Triage → implement → ship | Artifact-based state |
| Release automation | Preflight → deploy → verify | Side-effect gates |

### Code Quality

| Pattern | What It Does | Key Features |
|---------|--------------|--------------|
| Spec gates | Verify scope before coding | Fork for clean analysis |
| Adversarial review | Security-focused code review | Threat model in artifacts |
| Refactor loops | Safe read-only explore first | Tool restrictions |

### Domain Skills

| Pattern | What It Does | Key Features |
|---------|--------------|--------------|
| Framework-specific | Rails, React, etc conventions | Nested skill discovery |
| DB-aware | Schema injection for queries | Preprocessing with psql |
| Platform integrations | Jira, Linear, GitHub | MCP or API wrappers |

### Safety & Guardrails

| Pattern | What It Does | Key Features |
|---------|--------------|--------------|
| Safety nets | Block irreversible operations | PreToolUse hooks |
| Hardstops | Require human acknowledgment | Exit code blocking |
| Test gates | Enforce tests before commit | Hook enforcement |

### Context Management

| Pattern | What It Does | Key Features |
|---------|--------------|--------------|
| Memory plugins | Persist across sessions | MCP-backed storage |
| Context ledgers | Rolling state in files | Hook-driven updates |
| Constraint files | Minimal "always load" context | Shared conventions |

## Extraction Patterns

When you find a useful skill, extract patterns rather than copying wholesale:

1. **Identify the pattern** — What makes it work?
2. **Adapt to your context** — Match your conventions
3. **Minimize scope** — Take only what you need
4. **Document provenance** — Note where the pattern came from

<rules>

ALWAYS:
- Verify recency (prefer active projects)
- Review security surfaces before install
- Start with restricted permissions
- Document what you installed and why

NEVER:
- Blindly install from unknown sources
- Trust stars as quality signal
- Run obfuscated scripts
- Skip hook script review

</rules>

<references>

- [discovery-patterns.md](references/discovery-patterns.md) — Detailed GitHub search patterns
- [security-checklist.md](references/security-checklist.md) — Full audit checklist
- [use-cases.md](references/use-cases.md) — Extended use case catalog

</references>

Overview

This skill helps you find and evaluate community skills, plugins, and marketplaces so you can reuse proven patterns safely. It guides discovery on public code platforms, applies quality heuristics, and outlines a security-first audit workflow. Use it to decide whether to adopt, adapt, or avoid a community contribution.

How this skill works

The skill searches public projects and curated topic pages to surface candidate skills and plugins, then filters them with practical quality heuristics (recency, usage signals, content clarity). It provides an audit checklist for security surfaces, sandboxing guidance for first runs, and extraction patterns to safely adapt useful logic. It also highlights marketplace and manifest patterns to inspect before installation.

When to use it

  • Searching for existing skills before building from scratch
  • Evaluating a community plugin’s safety and maintenance status
  • Finding design patterns or inspiration for a new skill
  • Auditing a plugin or marketplace entry before installation
  • Preparing a safe first run of untrusted contributions

Best practices

  • Prefer actively maintained projects; check recent commits and issue activity
  • Inspect manifests, hook scripts, and any install scripts before running them
  • Start with minimal permissions and isolated context for the first run
  • Look for clear descriptions and explicit allowed-tool scopes rather than blanket access
  • Document what you installed, why, and any deviations from the original source

Example use cases

  • Locate a marketplace manifest and verify its sources and update policy before adding it to production
  • Shortlist candidate skills by filtering for recent commits and clear allowed-tool restrictions
  • Run a new community plugin in a forked context with model invocation disabled to observe behavior
  • Extract a useful preprocessing hook pattern and adapt only the minimal logic needed
  • Audit hook scripts for network calls and exit-code semantics before allowing side effects

FAQ

How do I limit risk when trying a new community skill?

Run the skill with minimal allowed tools, use an isolated/forked context, and disable model invocation initially. Monitor tool calls during the first run and expand permissions only after inspection.

What signals indicate a low-quality plugin?

Stale commits, many unresolved issues, vague descriptions, broad tool access without justification, obfuscated or undocumented install scripts, and opaque marketplace sources are common red flags.