Claudebar
Repository: ClaudeBar
Author: tddworks · Source status: Clear source
A macOS menu bar application that monitors AI coding assistant usage quotas.
Score basis:Clear source · Low risk signals · Universal
Repository: awesome-opa
Author: open-policy-agent·Source status: Clear source
A curated list of OPA related tools, frameworks and articles Topics: awesome, awesome-list, opa, opa-library, open-policy-agent, openpolicyagent, policy-as-code, security.
Score basis:Clear source · Low risk signals · Universal
Trust level
71 · Review first
Usable, but inspect source, install method, and risk hints before adoption.
Risk decision
No explicit risk signals
No explicit risk signal is available.
Install readiness
script-backed · copy-only command
SkillTrust only shows install guidance and copy actions; it never executes installs.
Before you install
Review source, permissions, and execution risk first, then alternatives. Scores prioritize review; they do not replace manual judgment.
Review weakest dimensions and next actions before copying commands.
Evidence or risk signals are incomplete; compare alternatives first.
Audit grade
C · Review first
Execution risk
High
Evidence confidence
65%
SAS-v2.1 radar
SAS-v2.1
Audit grade
C · Review first
Execution risk
High
Top threats
unexpected code execution, data exfiltration
Control gaps
missing license, broad permissions
Evidence confidence
65%
Repository
open-policy-agent/awesome-opa
Author
open-policy-agent
Community signal
874 stars · 85 forks
Last updated
2026-01-16
Primary source
open-policy-agent/awesome-opa
Source status
Clear source
Install method
script-backed
Command & code execution
34Focus: Whether it runs commands or scripts
Next action: Manually confirm command-running skills in an isolated directory.
High-risk action confirmation
38Focus: Whether destructive or external actions require confirmation
Next action: Avoid directly installing high-risk skills without confirmation controls.
Network & data egress
43Focus: Whether it may send data out
Next action: If unsure, restrict network access or allow only known domains.
Supported tools can change install steps; Universal entries need source review.
Explicitly supported
Candidate support (inferred)
Candidate tools are inferred signals, not official compatibility certifications.
git clone https://github.com/open-policy-agent/awesome-opa.gitNo explicit risk signals recorded
Review source and permissions before copying install commands.
Evidence or risk signals are incomplete; compare alternatives first.
Focus: Who published it and whether it is traceable
Next action: Review repository, author, and README first; do not install directly when source is pending.
Focus: Whether install steps can be reviewed
Next action: Prefer candidates with install docs and repository evidence.
Focus: Whether tool descriptions may hide instructions
Next action: Read README, rules, and tool descriptions before install.
Focus: What it can access
Next action: Grant only task-required permissions and prefer Ask/manual confirmation.
Focus: Whether it runs commands or scripts
Next action: Manually confirm command-running skills in an isolated directory.
Focus: Whether file reads/writes can escape scope
Next action: Check working directory and file access scope before running.
Focus: Whether it may send data out
Next action: If unsure, restrict network access or allow only known domains.
Focus: Whether it handles tokens, private keys, or agent identity
Next action: Do not provide long-lived tokens or private keys to source-pending skills.
Focus: Whether external content can steer behavior
Next action: For browser/RAG/rules skills, review permissions and confirmation controls first.
Focus: Whether memory or retrieved context can be poisoned
Next action: Try RAG/memory skills in a low-privilege environment first.
Focus: Whether external tools and MCP access are clearly bounded
Next action: Confirm which external tools it will connect to before install, and start with the smallest possible set.
Focus: Whether destructive or external actions require confirmation
Next action: Avoid directly installing high-risk skills without confirmation controls.
Focus: How far impact can spread when something goes wrong
Next action: If unsure, test in an isolated project first.
Focus: Whether actions can be traced
Next action: Prefer candidates with logs or previews.
Focus: Whether it is maintained and reusable
Next action: Check license and maintenance before organizational use.
Usable, but inspect source, install method, and risk hints before adoption.
Phase 1 only shows installation-aware, source-backed signals. SkillTrust does not execute install scripts for users.
Risk factors
No explicit risk signals.
Permission hints
repository clone, local runtime dependencies
Why related: Same task category, Keyword overlap...
Why related: Same task category, Keyword overlap, Similar install method
Repository: contrib
Author: open-policy-agent · Source status: Clear source
Integrations, examples, and proof-of-concepts that are not part of OPA proper.
Score basis:Clear source · Risk needs review · Universal
Why related: Keyword overlap, Same repository ecosystem...
Why related: Keyword overlap, Same repository ecosystem, Same author
Repository: vscode-opa
Author: open-policy-agent · Source status: Clear source
An extension for VS Code which provides support for OPA and the Rego policy language
Score basis:Clear source · Risk needs review · Universal
Why related: Keyword overlap, Same repository ecosystem...
Why related: Keyword overlap, Same repository ecosystem, Same author
Repository: gatekeeper-library
Author: open-policy-agent · Source status: Clear source
📚 The OPA Gatekeeper policy library
Score basis:Clear source · Risk needs review · Universal
Why related: Keyword overlap, Same repository ecosystem...
Why related: Keyword overlap, Same repository ecosystem, Same author
Repository: mcp-for-beginners
Author: microsoft · Source status: Clear source
This open-source curriculum introduces the fundamentals of Model Context Protocol (MCP) through real-world, cross-language examples in .NET, Java, TypeScript, JavaScript, Rust and Python.
Score basis:Clear source · Low risk signals · Universal
Why related: Same task category, Keyword overlap...
Why related: Same task category, Keyword overlap, Similar install method
Repository: DemoGPT
Author: melih-unsal · Source status: Clear source
🤖 Everything you need to create an LLM Agent—tools, prompts, frameworks, and models—all in one place.
Score basis:Clear source · Low risk signals · Universal
Why related: Same task category, Keyword overlap...
Why related: Same task category, Keyword overlap, Similar install method
Repository: opa
Author: open-policy-agent · Source status: Clear source
Open Policy Agent (OPA) is an open source, general-purpose policy engine.
Score basis:Clear source · Risk needs review · Universal
Repository: gatekeeper
Author: open-policy-agent · Source status: Clear source
🐊 Policy Controller for Kubernetes
Score basis:Clear source · Risk needs review · Universal