tauri-security
Configure Tauri v2 capabilities, scoped access rules, and ACL-based permission control for production apps. Use when generating capabilities/default.json, defining scoped access per plugin, or auditing permissions for minimum-privilege compliance.
Best use case
tauri-security is best used when you need a repeatable AI agent workflow instead of a one-off prompt. It is especially useful for teams working in multi. Configure Tauri v2 capabilities, scoped access rules, and ACL-based permission control for production apps. Use when generating capabilities/default.json, defining scoped access per plugin, or auditing permissions for minimum-privilege compliance.
Configure Tauri v2 capabilities, scoped access rules, and ACL-based permission control for production apps. Use when generating capabilities/default.json, defining scoped access per plugin, or auditing permissions for minimum-privilege compliance.
Users should expect a more consistent workflow output, faster repeated execution, and less time spent rewriting prompts from scratch.
Practical example
Example input
Use the "tauri-security" skill to help with this workflow task. Context: Configure Tauri v2 capabilities, scoped access rules, and ACL-based permission control for production apps. Use when generating capabilities/default.json, defining scoped access per plugin, or auditing permissions for minimum-privilege compliance.
Example output
A structured workflow result with clearer steps, more consistent formatting, and an output that is easier to reuse in the next run.
When to use this skill
- Use this skill when you want a reusable workflow rather than writing the same prompt again and again.
When not to use this skill
- Do not use this when you only need a one-off answer and do not need a reusable workflow.
- Do not use it if you cannot install or maintain the related files, repository context, or supporting tools.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/tauri-security/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How tauri-security Compares
| Feature / Agent | tauri-security | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Configure Tauri v2 capabilities, scoped access rules, and ACL-based permission control for production apps. Use when generating capabilities/default.json, defining scoped access per plugin, or auditing permissions for minimum-privilege compliance.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
SKILL.md Source
## When to use this skill
**ALWAYS use this skill when the user mentions:**
- Capability or scope design for Tauri v2
- Building or editing capabilities/default.json
- ACL-based permission control or audit
**Trigger phrases include:**
- "capabilities", "scope", "ACL", "permissions", "capabilities json", "minimum privilege"
## How to use this skill
1. **Create capabilities/default.json** in `src-tauri/capabilities/`:
```json
{
"identifier": "default",
"description": "Main window capabilities",
"windows": ["main"],
"permissions": [
"core:default",
"dialog:allow-open",
{ "identifier": "fs:allow-read-text-file", "allow": [{ "path": "$APPDATA/**" }] },
{ "identifier": "http:default", "allow": [{ "url": "https://api.example.com/**" }] }
]
}
```
2. **Map features to capabilities**: Each feature should use the minimum permissions required
3. **Define scoped access** to restrict file paths, URLs, and other resources:
```json
{ "identifier": "fs:allow-write-text-file", "allow": [{ "path": "$APPDATA/config/**" }] }
```
4. **Assign capabilities per window** -- different windows can have different permission sets
5. **Audit permissions** before release: remove any unused permissions, verify scope restrictions
6. **Validate at runtime** by testing that restricted operations correctly fail outside their scope
## Outputs
- capabilities/default.json with minimal permissions
- Feature-to-capability mapping
- Scoped access rules for files, URLs, and plugins
- Permission audit checklist
## References
- https://v2.tauri.app/security/capabilities/
- https://v2.tauri.app/security/scope/
## Keywords
tauri security, capabilities, scope, ACL, permissions, minimum privilegeRelated Skills
tauri
Primary index and router for all Tauri v2 framework skills covering Rust backend, frontend integration, and the full plugin ecosystem. Use when any Tauri-related request is made to route to the correct specialized sub-skill with local examples and templates.
tauri-window
Create and configure Tauri v2 windows including multi-window patterns, custom titlebars, and frameless window UI. Use when creating new windows, managing window lifecycle events, implementing custom titlebar drag regions, or building multi-window architectures.
tauri-setup
Install Tauri v2 prerequisites and configure the development environment across macOS, Windows, Linux, Android, and iOS. Use when setting up Rust toolchain, Node.js, platform build tools, or mobile development prerequisites (Xcode, Android Studio).
tauri-scaffold
Scaffold a Tauri v2 project with create-tauri-app, configure project structure, and set up static export for frontend frameworks. Use when creating a new project, understanding the Tauri project structure, or configuring SSG/static export for Next.js or SvelteKit.
tauri-mobile
Set up Tauri v2 for Android and iOS development including build configuration, bundle identifiers, and mobile debugging. Use when adding mobile targets to a Tauri app, configuring Android/iOS bundle IDs, or debugging on mobile devices and emulators.
tauri-ipc
Implement frontend-to-Rust IPC using invoke calls, Tauri commands, and type-safe bindings in Tauri v2. Use when defining Rust commands callable from the frontend, setting up typed IPC contracts, or implementing bidirectional event-based communication.
tauri-framework-upgrade
Migrate Tauri apps from v1 to v2 or from v2 beta to v2 stable, handling breaking changes in config, plugins, and permissions. Use when upgrading Tauri versions, resolving migration errors, or updating config/capability formats for v2.
tauri-framework-security
Harden a Tauri v2 app with baseline security controls including CSP, HTTP headers, runtime authority, and capability matrices. Use when performing security audits, configuring CSP/headers per window, or building a minimum-privilege capability matrix for production.
tauri-config
Configure tauri.conf.json for Tauri v2 apps including app metadata, build settings, plugins, CSP, and platform-specific sections. Use when editing tauri.conf.json, migrating config from v1 to v2, or setting up CSP and platform-specific configuration.
tauri-concept
Explain Tauri v2 architecture concepts including the process model, IPC isolation, and brownfield integration patterns. Use when understanding how Tauri works internally, choosing between isolation and brownfield modes, or making architecture decisions before implementation.
tauri-build
Build production-ready Tauri v2 app bundles with code signing and distribution packaging for all platforms. Use when creating release builds, configuring code signing for macOS/Windows, or setting up CI pipelines for app distribution.
tauri-app-websocket
Establish WebSocket connections from the Rust side using the Tauri v2 websocket plugin, bypassing WebView limitations. Use when implementing real-time messaging, managing WebSocket connection lifecycle, or configuring host allowlists for secure connections.