linux-gpg-signing

Sign Linux packages with GPG keys for secure distribution

509 stars

Best use case

linux-gpg-signing is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

Sign Linux packages with GPG keys for secure distribution

Teams using linux-gpg-signing should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/linux-gpg-signing/SKILL.md --create-dirs "https://raw.githubusercontent.com/a5c-ai/babysitter/main/library/specializations/desktop-development/skills/linux-gpg-signing/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/linux-gpg-signing/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How linux-gpg-signing Compares

Feature / Agentlinux-gpg-signingStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Sign Linux packages with GPG keys for secure distribution

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

SKILL.md Source

# linux-gpg-signing

Sign Linux packages with GPG keys for secure distribution through package repositories.

## Capabilities

- Generate GPG signing keys
- Sign DEB packages
- Sign RPM packages
- Sign AppImages
- Configure APT repository signing
- Set up YUM/DNF repository signing
- Export public keys for distribution

## Input Schema

```json
{
  "type": "object",
  "properties": {
    "packagePath": { "type": "string" },
    "keyId": { "type": "string" },
    "packageType": { "enum": ["deb", "rpm", "appimage"] }
  },
  "required": ["packagePath", "keyId"]
}
```

## Signing Commands

```bash
# Generate GPG key
gpg --full-generate-key

# Sign DEB package
dpkg-sig --sign builder -k $KEY_ID package.deb

# Sign RPM package
rpm --addsign -D "_gpg_name $KEY_ID" package.rpm

# Export public key
gpg --armor --export $KEY_ID > public-key.asc
```

## Related Skills

- `deb-package-builder`
- `rpm-spec-generator`