Best use case
linux-gpg-signing is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Sign Linux packages with GPG keys for secure distribution
Teams using linux-gpg-signing should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/linux-gpg-signing/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How linux-gpg-signing Compares
| Feature / Agent | linux-gpg-signing | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Sign Linux packages with GPG keys for secure distribution
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
SKILL.md Source
# linux-gpg-signing
Sign Linux packages with GPG keys for secure distribution through package repositories.
## Capabilities
- Generate GPG signing keys
- Sign DEB packages
- Sign RPM packages
- Sign AppImages
- Configure APT repository signing
- Set up YUM/DNF repository signing
- Export public keys for distribution
## Input Schema
```json
{
"type": "object",
"properties": {
"packagePath": { "type": "string" },
"keyId": { "type": "string" },
"packageType": { "enum": ["deb", "rpm", "appimage"] }
},
"required": ["packagePath", "keyId"]
}
```
## Signing Commands
```bash
# Generate GPG key
gpg --full-generate-key
# Sign DEB package
dpkg-sig --sign builder -k $KEY_ID package.deb
# Sign RPM package
rpm --addsign -D "_gpg_name $KEY_ID" package.rpm
# Export public key
gpg --armor --export $KEY_ID > public-key.asc
```
## Related Skills
- `deb-package-builder`
- `rpm-spec-generator`Related Skills
code-signing-setup
Configure code signing for macOS and Windows binaries with notarization.
process-builder
Scaffold new babysitter process definitions following SDK patterns, proper structure, and best practices. Guides the 3-phase workflow from research to implementation.
babysitter
Orchestrate via @babysitter. Use this skill when asked to babysit a run, orchestrate a process or whenever it is called explicitly. (babysit, babysitter, orchestrate, orchestrate a run, workflow, etc.)
yolo
Run Babysitter autonomously with minimal manual interruption.
user-install
Install the user-level Babysitter Codex setup.
team-install
Install the team-pinned Babysitter Codex workspace setup.
retrospect
Summarize or retrospect on a completed Babysitter run.
resume
Resume an existing Babysitter run from Codex.
project-install
Install the Babysitter Codex workspace integration into the current project.
plan
Plan a Babysitter workflow without executing the run.
observe
Observe, inspect, or monitor a Babysitter run.
model
Inspect or change Babysitter model-routing policy by phase.