smack-policy-generator

Generates SMACK policy files from app requirements. Creates mandatory access control rules for process isolation and resource access.

16 stars

Best use case

smack-policy-generator is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

Generates SMACK policy files from app requirements. Creates mandatory access control rules for process isolation and resource access.

Teams using smack-policy-generator should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/smack-policy-generator/SKILL.md --create-dirs "https://raw.githubusercontent.com/plurigrid/asi/main/plugins/asi/skills/smack-policy-generator/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/smack-policy-generator/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How smack-policy-generator Compares

Feature / Agentsmack-policy-generatorStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Generates SMACK policy files from app requirements. Creates mandatory access control rules for process isolation and resource access.

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

SKILL.md Source

# Smack Policy Generator Skill

**Trit**: 1 (PLUS)
**Category**: tizen-development
**Author**: Tizen Community
**Source**: tizen/development
**License**: Apache-2.0

## Description

Generates SMACK policy files from app requirements. Creates mandatory access control rules for process isolation and resource access.

## When to Use

This is a Tizen security/IoT skill. Use when:
- Developing Tizen applications (web, native, .NET)
- Auditing Tizen app security
- Provisioning TizenRT/ARTIK IoT devices
- Implementing Tizen compliance
- Analyzing SMACK policies or Cynara access control

## Tizen Security Model

### SMACK (Simplified Mandatory Access Control Kernel)
- Linux kernel 3.12+ mandatory access control
- Process isolation via labels
- Prevent inter-app resource access

### Cynara
- Fast privilege access control service
- Policy-based permission checking
- External agent integration

### KeyManager
- Central secure storage repository
- Password-protected data access
- Certificate and key management

### Tizen Manifest
- Privilege declarations (public, partner, platform)
- App sandboxing configuration
- Resource access specifications

## Related Skills

- manifest-privilege-validator
- smack-policy-auditor
- tizen-cve-scanner
- sandbox-escape-detector
- cynara-policy-checker
- iot-device-provisioning

## References

- Tizen Official Docs: https://docs.tizen.org/
- Samsung Security Manager: https://github.com/Samsung/security-manager
- Samsung Cynara: https://github.com/Samsung/cynara
- TizenRT: https://github.com/Samsung/TizenRT

Related Skills

testing-handbook-generator

16
from plurigrid/asi

Generates comprehensive testing handbooks and guides for security testing strategies.

smack-policy-auditor

16
from plurigrid/asi

Analyzes SMACK policy files for correctness, label conflicts, and access control issues. Verifies mandatory access control rules.

smack-label-orchestrator

16
from plurigrid/asi

Manages SMACK label assignments across apps and kernel. Coordinates mandatory access control labels with process isolation.

reverse-derivative-generator

16
from plurigrid/asi

Triadic skill (generation)

privilege-declaration-generator

16
from plurigrid/asi

Generates tizen-manifest.xml and config.xml privilege declarations. Auto-detects required privileges from app source code.

phase-portrait-generator

16
from plurigrid/asi

Generate phase portraits for 2D dynamical systems. Use when visualizing vector fields, nullclines, and trajectories.

performing-dmarc-policy-enforcement-rollout

16
from plurigrid/asi

Execute a phased DMARC rollout from p=none monitoring through p=quarantine to p=reject enforcement, ensuring all legitimate email sources are authenticated before blocking unauthorized senders.

performing-content-security-policy-bypass

16
from plurigrid/asi

Analyze and bypass Content Security Policy implementations to achieve cross-site scripting by exploiting misconfigurations, JSONP endpoints, unsafe directives, and policy injection techniques.

implementing-usb-device-control-policy

16
from plurigrid/asi

Implements USB device control policies to restrict unauthorized removable media access on endpoints, preventing data exfiltration and malware introduction via USB devices. Use when deploying device control via Group Policy, Intune, or EDR platforms to enforce USB restrictions. Activates for requests involving USB control, removable media policy, device control, or data loss prevention via USB.

implementing-policy-as-code-with-open-policy-agent

16
from plurigrid/asi

This skill covers implementing Open Policy Agent (OPA) and Gatekeeper for policy-as-code enforcement in Kubernetes and CI/CD pipelines. It addresses writing Rego policies, deploying OPA Gatekeeper as a Kubernetes admission controller, testing policies in development, and integrating policy evaluation into deployment pipelines.

implementing-opa-gatekeeper-for-policy-enforcement

16
from plurigrid/asi

Enforce Kubernetes admission policies using OPA Gatekeeper with ConstraintTemplates, Rego rules, and the Gatekeeper policy library.

implementing-kubernetes-network-policy-with-calico

16
from plurigrid/asi

Implement Kubernetes network segmentation using Calico NetworkPolicy and GlobalNetworkPolicy for zero-trust pod-to-pod communication.