npx skills add https://github.com/boshu2/agentops --skill security目的: 在代码、脚本、钩子和发布门控中运行可重复的安全检查。
当您需要在合并/发布前进行确定性的安全验证,或进行定期的计划检查时,请使用此技能。
/security # 快速安全门控
/security --full # 包含测试工具链检查的完整门控
/security --release # 用于发布准备的完整门控
/security --json # 机器可读的报告输出
运行快速门控:
scripts/security-gate.sh --mode quick
预期行为:
$TMPDIR/agentops-security/<run-id>/ 目录下。运行完整门控:
scripts/security-gate.sh --mode full
预期行为:
广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
夜间工作流应运行:
scripts/security-gate.sh --mode full
预期行为:
当门控失败时:
$TMPDIR/agentops-security/ 中的最新产物,识别扫描器和文件。scripts/security-gate.sh 直到门控通过。Security gate run: <run-id>
Mode: <quick|full>
Result: <pass|blocked>
Top findings:
- <scanner> <severity> <file> <summary>
Actions:
- <fix or issue id>
.github/workflows/validate.yml.github/workflows/nightly.yml.github/workflows/release.ymlskills/security-suite/SKILL.md(包含 security_suite.py 和 prompt_redteam.py)用户说: /security
发生的情况:
scripts/security-gate.sh --mode quick,该命令针对当前工作树执行可用扫描器(semgrep、gosec、gitleaks)并标记高/严重级别问题。$TMPDIR/agentops-security/<run-id>/ 以供审查,门控报告通过/阻止的判定。结果: 门控通过,没有发现高/严重级别问题,确认分支可以安全地打开合并请求。
用户说: /security --release
发生的情况:
scripts/security-gate.sh --mode full,该命令执行全面的扫描,包括所有扫描器检查、包含测试的工具链检查以及更严格的严重性阈值。$TMPDIR/agentops-security/<run-id>/ 下用于审计追踪和事件响应,并生成结构化报告。结果: 完整门控因在 cli/internal/config.go 中发现两个中等严重性问题而阻止发布;操作员对问题进行分类和修复,然后重新运行门控以获得干净的通过结果。
| 问题 | 原因 | 解决方案 |
|---|---|---|
| 门控报告"未找到扫描器"并跳过检查 | 所需的扫描器(semgrep、gosec 或 gitleaks)未安装 | 安装缺失的扫描器:brew install semgrep、go install github.com/securego/gosec/v2/cmd/gosec@latest 或 brew install gitleaks。 |
| 门控在本地通过但在 CI 中失败 | CI 环境有额外的扫描器或更严格的配置 | 比较两个环境中的 $TMPDIR/agentops-security/ 产物;对齐本地和 CI 的扫描器版本和配置文件。 |
| 误报阻止门控 | 扫描器将非问题标记为高/严重级别 | 添加扫描器特定的内联抑制注释(例如 # nosemgrep: rule-id)或更新扫描器配置以排除该模式,然后记录抑制原因。 |
未创建产物目录 $TMPDIR/agentops-security/ | 脚本缺少写入权限或 $TMPDIR 不可写 | 验证 $TMPDIR 已设置且可写;脚本会在每次运行时自动创建子目录。 |
| 夜间扫描未检测到回归 | 夜间工作流未配置或指向过时的分支 | 验证 .github/workflows/nightly.yml 针对正确的分支(通常是 main)运行 scripts/security-gate.sh --mode full。 |
每周安装数
144
仓库
GitHub 星标数
205
首次出现
2026年2月19日
安全审计
安装于
opencode144
github-copilot140
codex140
gemini-cli140
kimi-cli139
amp139
Purpose: Run repeatable security checks across code, scripts, hooks, and release gates.
Use this skill when you need deterministic security validation before merge/release, or recurring scheduled checks.
/security # quick security gate
/security --full # full gate with test-inclusive toolchain checks
/security --release # full gate for release readiness
/security --json # machine-readable report output
Run quick gate:
scripts/security-gate.sh --mode quick
Expected behavior:
$TMPDIR/agentops-security/<run-id>/.Run full gate:
scripts/security-gate.sh --mode full
Expected behavior:
Nightly workflow should run:
scripts/security-gate.sh --mode full
Expected behavior:
When gate fails:
$TMPDIR/agentops-security/ and identify scanner + file.scripts/security-gate.sh until gate passes.Security gate run: <run-id>
Mode: <quick|full>
Result: <pass|blocked>
Top findings:
- <scanner> <severity> <file> <summary>
Actions:
- <fix or issue id>
.github/workflows/validate.yml.github/workflows/nightly.yml.github/workflows/release.ymlskills/security-suite/SKILL.md (includes security_suite.py and prompt_redteam.py)User says: /security
What happens:
scripts/security-gate.sh --mode quick, which executes available scanners (semgrep, gosec, gitleaks) against the current working tree and flags high/critical findings.$TMPDIR/agentops-security/<run-id>/ for review, and the gate reports a pass/blocked verdict.Result: The gate passes with no high/critical findings, confirming the branch is safe to open a PR.
User says: /security --release
What happens:
scripts/security-gate.sh --mode full, which performs a comprehensive scan including all scanner passes, test-inclusive toolchain checks, and stricter severity thresholds.$TMPDIR/agentops-security/<run-id>/ for audit trail and incident response, and a structured report is generated.Result: The full gate blocks the release on two medium-severity findings in cli/internal/config.go; the operator triages and fixes them before re-running the gate to get a clean pass.
| Problem | Cause | Solution |
|---|---|---|
| Gate reports "scanner not found" and skips checks | Required scanner (semgrep, gosec, or gitleaks) is not installed | Install the missing scanner: brew install semgrep, go install github.com/securego/gosec/v2/cmd/gosec@latest, or brew install gitleaks. |
| Gate passes locally but fails in CI | CI environment has additional scanners or stricter config | Compare $TMPDIR/agentops-security/ artifacts from both environments; align scanner versions and config files across local and CI. |
| False positive blocking the gate | Scanner flags a non-issue as high/critical severity | Add a scanner-specific inline suppression comment (e.g., # nosemgrep: rule-id) or update the scanner config to exclude the pattern, then document the suppression reason. |
Weekly Installs
144
Repository
GitHub Stars
205
First Seen
Feb 19, 2026
Security Audits
Gen Agent Trust HubPassSocketPassSnykPass
Installed on
opencode144
github-copilot140
codex140
gemini-cli140
kimi-cli139
amp139
Azure Data Explorer (Kusto) 查询技能:KQL数据分析、日志遥测与时间序列处理
119,800 周安装
Sentry Browser SDK 安装指南:为网站和JavaScript项目添加错误监控与追踪
400 周安装
Agent-Native 架构指南:构建原生智能体应用的核心原则与最佳实践
396 周安装
Cosmos dbt Fusion 实施指南:在 Airflow 中集成 dbt Fusion 的完整步骤
396 周安装
服务器管理运维指南:进程监控、日志安全与扩缩容决策
389 周安装
LangChain4j Spring Boot集成指南:AI驱动微服务自动配置与RAG系统实现
389 周安装
高级提示工程模式:最大化LLM性能的5大核心技术与模板系统
390 周安装
Artifacts directory $TMPDIR/agentops-security/ not created | Script lacks write permissions or $TMPDIR is not writable | Verify $TMPDIR is set and writable; the script auto-creates subdirectories on each run. |
| Nightly scan not detecting regressions | Nightly workflow is not configured or is pointing at stale branch | Verify .github/workflows/nightly.yml runs scripts/security-gate.sh --mode full against the correct branch (typically main). |