multiAI Summary Pending

tauri-security

Configure Tauri v2 capabilities, scoped access rules, and ACL-based permission control for production apps. Use when generating capabilities/default.json, defining scoped access per plugin, or auditing permissions for minimum-privilege compliance.

223 stars

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/tauri-security/SKILL.md --create-dirs "https://raw.githubusercontent.com/partme-ai/full-stack-skills/main/skills/tauri-skills/tauri-security/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/tauri-security/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How tauri-security Compares

Feature / Agenttauri-securityStandard Approach
Platform SupportmultiLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Configure Tauri v2 capabilities, scoped access rules, and ACL-based permission control for production apps. Use when generating capabilities/default.json, defining scoped access per plugin, or auditing permissions for minimum-privilege compliance.

Which AI agents support this skill?

This skill is compatible with multi.

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

SKILL.md Source

## When to use this skill

**ALWAYS use this skill when the user mentions:**
- Capability or scope design for Tauri v2
- Building or editing capabilities/default.json
- ACL-based permission control or audit

**Trigger phrases include:**
- "capabilities", "scope", "ACL", "permissions", "capabilities json", "minimum privilege"

## How to use this skill

1. **Create capabilities/default.json** in `src-tauri/capabilities/`:
   ```json
   {
     "identifier": "default",
     "description": "Main window capabilities",
     "windows": ["main"],
     "permissions": [
       "core:default",
       "dialog:allow-open",
       { "identifier": "fs:allow-read-text-file", "allow": [{ "path": "$APPDATA/**" }] },
       { "identifier": "http:default", "allow": [{ "url": "https://api.example.com/**" }] }
     ]
   }
   ```
2. **Map features to capabilities**: Each feature should use the minimum permissions required
3. **Define scoped access** to restrict file paths, URLs, and other resources:
   ```json
   { "identifier": "fs:allow-write-text-file", "allow": [{ "path": "$APPDATA/config/**" }] }
   ```
4. **Assign capabilities per window** -- different windows can have different permission sets
5. **Audit permissions** before release: remove any unused permissions, verify scope restrictions
6. **Validate at runtime** by testing that restricted operations correctly fail outside their scope

## Outputs

- capabilities/default.json with minimal permissions
- Feature-to-capability mapping
- Scoped access rules for files, URLs, and plugins
- Permission audit checklist

## References

- https://v2.tauri.app/security/capabilities/
- https://v2.tauri.app/security/scope/

## Keywords

tauri security, capabilities, scope, ACL, permissions, minimum privilege