wip-repo-permissions-hook

Repo visibility guard. Blocks repos from going public without a -private counterpart.

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "wip-repo-permissions-hook" with this command: npx skills add Parker Todd Brooks/wip-repo-permissions-hook

Repo Permissions Hook

What This Does

Prevents repos from being made public unless a -private counterpart exists on GitHub. Protects internal plans, todos, and development context from accidental exposure.

The Rule

Every repo that goes public must have a {name}-private repo. The private repo holds ai/ folders with plans, todos, dev updates, and notes. The public repo has the same code without ai/.

Forks of external projects are exempt.

How to Use

Check before changing visibility

node cli.js check <org>/<repo>

Audit all public repos

node cli.js audit <org>

Install as Claude Code hook

Add to ~/.claude/settings.json under hooks.PreToolUse with matcher "Bash".

Install as OpenClaw plugin

Copy to ~/.ldm/extensions/wip-repo-permissions-hook/ and restart gateway.

MCP

Tools: repo_permissions_check, repo_permissions_audit

Add to .mcp.json:

{
  "wip-repo-permissions": {
    "command": "node",
    "args": ["/path/to/tools/wip-repo-permissions-hook/mcp-server.mjs"]
  }
}

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.