multiAI Summary Pending
tauri-security
Configure Tauri v2 capabilities, scoped access rules, and ACL-based permission control for production apps. Use when generating capabilities/default.json, defining scoped access per plugin, or auditing permissions for minimum-privilege compliance.
223 stars
Installation
Claude Code / Cursor / Codex
$curl -o ~/.claude/skills/tauri-security/SKILL.md --create-dirs "https://raw.githubusercontent.com/partme-ai/full-stack-skills/main/skills/tauri-skills/tauri-security/SKILL.md"
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/tauri-security/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How tauri-security Compares
| Feature / Agent | tauri-security | Standard Approach |
|---|---|---|
| Platform Support | multi | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Configure Tauri v2 capabilities, scoped access rules, and ACL-based permission control for production apps. Use when generating capabilities/default.json, defining scoped access per plugin, or auditing permissions for minimum-privilege compliance.
Which AI agents support this skill?
This skill is compatible with multi.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
SKILL.md Source
## When to use this skill
**ALWAYS use this skill when the user mentions:**
- Capability or scope design for Tauri v2
- Building or editing capabilities/default.json
- ACL-based permission control or audit
**Trigger phrases include:**
- "capabilities", "scope", "ACL", "permissions", "capabilities json", "minimum privilege"
## How to use this skill
1. **Create capabilities/default.json** in `src-tauri/capabilities/`:
```json
{
"identifier": "default",
"description": "Main window capabilities",
"windows": ["main"],
"permissions": [
"core:default",
"dialog:allow-open",
{ "identifier": "fs:allow-read-text-file", "allow": [{ "path": "$APPDATA/**" }] },
{ "identifier": "http:default", "allow": [{ "url": "https://api.example.com/**" }] }
]
}
```
2. **Map features to capabilities**: Each feature should use the minimum permissions required
3. **Define scoped access** to restrict file paths, URLs, and other resources:
```json
{ "identifier": "fs:allow-write-text-file", "allow": [{ "path": "$APPDATA/config/**" }] }
```
4. **Assign capabilities per window** -- different windows can have different permission sets
5. **Audit permissions** before release: remove any unused permissions, verify scope restrictions
6. **Validate at runtime** by testing that restricted operations correctly fail outside their scope
## Outputs
- capabilities/default.json with minimal permissions
- Feature-to-capability mapping
- Scoped access rules for files, URLs, and plugins
- Permission audit checklist
## References
- https://v2.tauri.app/security/capabilities/
- https://v2.tauri.app/security/scope/
## Keywords
tauri security, capabilities, scope, ACL, permissions, minimum privilege