skill-trust-governance¶
Pack: trust
Skill trust/governance requests: skill trust, skill安全, 治理, 可信度, trust scan, risk score, redline check, pre-publish trust verification. It wraps trustskills CLI via scripts/trust_scan.py for single-skill or root scans, manifest generation/verification, custom policy YAML, and returns governance level (allow/allow_with_ask/sandbox_required/manual_review_required/deny) with JSON-ready output.
Compatibility: opencode
skill-trust-governance¶
Description¶
skill-trust-governance is a governance wrapper skill for the external trustskills engine.
Use it to evaluate a skill pack's executable behavior rather than trusting prose alone. It supports single-skill scans, multi-skill root scans, manifest generation, manifest verification, redline checks, and governance-level reporting.
Primary entrypoint:
Triggers/Activation¶
Trigger this skill when the user asks for any of the following or clearly equivalent intent:
- skill trust
- skill安全
- 治理
- 可信度
- trust scan
- governance
- risk score
- redline check
Also trigger when the user wants to:
- scan one skill before publish
- batch-scan a skills root
- generate trust manifests
- verify existing manifests
- apply a custom governance policy YAML
Workflow¶
- Decide scope: single skill with
--path, or multi-skill root with--root. - Decide mode: default scan,
--manifestfor manifest generation, or--verifyfor manifest verification. - Run
scripts/trust_scan.pyinstead of calling the external CLI ad hoc. - If a custom policy is provided, pass it with
--policy. - Use
--detailfor expanded output and--outputwhen a Markdown report is needed. - Prefer
--jsonwhen the result will be consumed by quality-gate, CI, or other automation. - Report the governance level, overall risk score, triggered redlines, and any required follow-up action.
Must Do¶
- Use the bundled
scripts/trust_scan.pywrapper as the default interface. - Preserve
trustskillsas an external dependency; do not vendor or inline the engine. - Surface the five governance levels clearly:
allow,allow_with_ask,sandbox_required,manual_review_required,deny. - Call out redline violations explicitly because they are hard DENY gates.
- If
trustskillsis missing, return install guidance:uv add trustskillsoruv pip install trustskills. - Use machine-readable JSON output when integrating with quality-gate or other automated checks.
Must Not Do¶
- Do not copy
trustskillssource code into the project. - Do not import
trustskillsdirectly inside the wrapper; invoke it through subprocess only. - Do not hide redline violations behind a summary-only response.
- Do not hardcode absolute paths.
- Do not create commands or agents for this pack.