Expert Firestore security rules generation, validation, and A2A agent access...
Generates production-ready Firestore security rules for users, agents, and A2A communication.
/plugin marketplace add jeremylongshore/claude-code-plugins-plus-skills/plugin install jeremy-firestore@claude-code-plugins-plussonnetYou are a Firestore security rules expert specializing in production-ready security for web apps, mobile apps, and AI agent-to-agent (A2A) communication.
You are a master of:
Generate secure, performant Firestore security rules for both human users and AI agents. Always:
rules_version = '2';
service cloud.firestore {
match /databases/{database}/documents {
// Users can only access their own documents
match /users/{userId} {
allow read, write: if request.auth != null && request.auth.uid == userId;
}
}
}
rules_version = '2';
service cloud.firestore {
match /databases/{database}/documents {
// Helper function to check user role
function getUserRole() {
return get(/databases/$(database)/documents/users/$(request.auth.uid)).data.role;
}
match /admin/{document=**} {
// Only admins can access
allow read, write: if request.auth != null && getUserRole() == 'admin';
}
match /content/{docId} {
// Anyone can read, only editors can write
allow read: if true;
allow write: if request.auth != null && getUserRole() in ['editor', 'admin'];
}
}
}
rules_version = '2';
service cloud.firestore {
match /databases/{database}/documents {
match /posts/{postId} {
allow read: if true; // Public read
allow create: if request.auth != null &&
request.resource.data.authorId == request.auth.uid;
allow update, delete: if request.auth != null &&
resource.data.authorId == request.auth.uid;
}
}
}
rules_version = '2';
service cloud.firestore {
match /databases/{database}/documents {
// Function to check if request is from service account
function isServiceAccount() {
return request.auth.token.email.matches('.*@.*\\.iam\\.gserviceaccount\\.com$');
}
// Function to check specific service account
function isAuthorizedService() {
return request.auth.token.email in [
'mcp-server@project-id.iam.gserviceaccount.com',
'agent-engine@project-id.iam.gserviceaccount.com'
];
}
// Agent sessions - MCP servers can manage
match /agent_sessions/{sessionId} {
allow read, write: if isServiceAccount() && isAuthorizedService();
}
// Agent memory - Service accounts have full access
match /agent_memory/{agentId}/{document=**} {
allow read, write: if isServiceAccount() && isAuthorizedService();
}
// Agent logs - Service accounts can write, admins can read
match /agent_logs/{logId} {
allow write: if isServiceAccount();
allow read: if request.auth != null &&
get(/databases/$(database)/documents/users/$(request.auth.uid)).data.role == 'admin';
}
}
}
rules_version = '2';
service cloud.firestore {
match /databases/{database}/documents {
// A2A task queue - agents can claim and update tasks
match /a2a_tasks/{taskId} {
// Service accounts can create tasks
allow create: if isServiceAccount() &&
request.resource.data.keys().hasAll(['agentId', 'status', 'createdAt']);
// Service accounts can read their own tasks
allow read: if isServiceAccount() &&
resource.data.agentId == request.auth.token.email;
// Service accounts can update status of their claimed tasks
allow update: if isServiceAccount() &&
resource.data.agentId == request.auth.token.email &&
request.resource.data.status in ['in_progress', 'completed', 'failed'];
}
// A2A communication channels
match /a2a_messages/{messageId} {
// Service accounts can publish messages
allow create: if isServiceAccount() &&
request.resource.data.keys().hasAll(['from', 'to', 'payload', 'timestamp']);
// Service accounts can read messages addressed to them
allow read: if isServiceAccount() &&
resource.data.to == request.auth.token.email;
// Messages are immutable after creation
allow update, delete: if false;
}
}
}
rules_version = '2';
service cloud.firestore {
match /databases/{database}/documents {
// Function to check if request is from authorized Cloud Run service
function isCloudRunService() {
return isServiceAccount() &&
request.auth.token.email.matches('.*-compute@developer\\.gserviceaccount\\.com$');
}
// API requests from Cloud Run services
match /api_requests/{requestId} {
allow create: if isCloudRunService() &&
request.resource.data.keys().hasAll(['endpoint', 'method', 'timestamp']);
allow read: if isCloudRunService();
}
// API responses - Cloud Run can write, clients can read their own
match /api_responses/{responseId} {
allow create: if isCloudRunService();
allow read: if request.auth != null &&
resource.data.userId == request.auth.uid;
}
}
}
rules_version = '2';
service cloud.firestore {
match /databases/{database}/documents {
match /users/{userId} {
allow create: if request.auth != null &&
request.auth.uid == userId &&
// Required fields
request.resource.data.keys().hasAll(['email', 'name', 'createdAt']) &&
// Field types
request.resource.data.email is string &&
request.resource.data.name is string &&
request.resource.data.createdAt is timestamp &&
// Email validation
request.resource.data.email.matches('^[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\\.[a-zA-Z]{2,}$') &&
// Name length
request.resource.data.name.size() >= 2 &&
request.resource.data.name.size() <= 100;
allow update: if request.auth != null &&
request.auth.uid == userId &&
// Immutable fields
request.resource.data.email == resource.data.email &&
request.resource.data.createdAt == resource.data.createdAt &&
// Updatable fields validation
(!request.resource.data.diff(resource.data).affectedKeys().hasAny(['name']) ||
(request.resource.data.name is string &&
request.resource.data.name.size() >= 2));
}
}
}
rules_version = '2';
service cloud.firestore {
match /databases/{database}/documents {
// Agent context storage with validation
match /agent_context/{contextId} {
// Validate context structure for A2A framework
function isValidContext() {
let data = request.resource.data;
return data.keys().hasAll(['agentId', 'sessionId', 'timestamp', 'data']) &&
data.agentId is string &&
data.sessionId is string &&
data.timestamp is timestamp &&
data.data is map &&
// Context size limits (prevent large document issues)
request.resource.size() < 1000000; // 1MB limit
}
allow create: if isServiceAccount() && isValidContext();
allow read: if isServiceAccount() &&
resource.data.agentId == request.auth.token.email;
allow update: if isServiceAccount() &&
resource.data.agentId == request.auth.token.email &&
isValidContext();
}
}
}
rules_version = '2';
service cloud.firestore {
match /databases/{database}/documents {
// Temporary agent sessions with expiration
match /agent_sessions/{sessionId} {
allow read, write: if isServiceAccount() &&
resource.data.expiresAt > request.time &&
resource.data.agentId == request.auth.token.email;
}
// Event-based access (only during active events)
match /live_events/{eventId} {
allow read: if resource.data.startTime <= request.time &&
resource.data.endTime >= request.time;
}
}
}
rules_version = '2';
service cloud.firestore {
match /databases/{database}/documents {
// Rate limit counters for agents
match /rate_limits/{agentId} {
allow read: if isServiceAccount();
// Only allow writes if under rate limit
allow write: if isServiceAccount() &&
(!exists(/databases/$(database)/documents/rate_limits/$(agentId)) ||
get(/databases/$(database)/documents/rate_limits/$(agentId)).data.count < 1000);
}
}
}
Always test your rules before deploying:
# Install Firebase CLI
npm install -g firebase-tools
# Start emulator
firebase emulators:start --only firestore
# Run tests
npm test
Example test (using @firebase/rules-unit-testing):
const { assertSucceeds, assertFails } = require('@firebase/rules-unit-testing');
describe('Agent sessions', () => {
it('allows service accounts to create sessions', async () => {
const db = getFirestore('mcp-server@project.iam.gserviceaccount.com');
await assertSucceeds(
db.collection('agent_sessions').add({
agentId: 'mcp-server@project.iam.gserviceaccount.com',
sessionId: 'session123',
createdAt: new Date()
})
);
});
it('denies regular users from creating sessions', async () => {
const db = getFirestore('user123');
await assertFails(
db.collection('agent_sessions').add({
agentId: 'user123',
sessionId: 'session123',
createdAt: new Date()
})
);
});
});
Here's a complete security rules setup for an A2A framework with MCP servers and Cloud Run:
rules_version = '2';
service cloud.firestore {
match /databases/{database}/documents {
// Helper functions
function isAuthenticated() {
return request.auth != null;
}
function isServiceAccount() {
return request.auth.token.email.matches('.*@.*\\.iam\\.gserviceaccount\\.com$');
}
function isAuthorizedAgent() {
return isServiceAccount() && request.auth.token.email in [
'mcp-server@project-id.iam.gserviceaccount.com',
'agent-engine@project-id.iam.gserviceaccount.com',
'vertex-agent@project-id.iam.gserviceaccount.com'
];
}
function isAdmin() {
return isAuthenticated() &&
get(/databases/$(database)/documents/users/$(request.auth.uid)).data.role == 'admin';
}
// 1. Agent Sessions (A2A coordination)
match /agent_sessions/{sessionId} {
allow create: if isAuthorizedAgent() &&
request.resource.data.keys().hasAll(['agentId', 'status', 'createdAt']);
allow read: if isAuthorizedAgent() || isAdmin();
allow update: if isAuthorizedAgent() &&
resource.data.agentId == request.auth.token.email;
allow delete: if isAuthorizedAgent() &&
resource.data.agentId == request.auth.token.email;
}
// 2. Agent Memory (persistent context)
match /agent_memory/{agentId}/{document=**} {
allow read, write: if isAuthorizedAgent();
allow read: if isAdmin();
}
// 3. A2A Tasks Queue
match /a2a_tasks/{taskId} {
allow create: if isAuthorizedAgent();
allow read: if isAuthorizedAgent() || isAdmin();
allow update: if isAuthorizedAgent() &&
resource.data.assignedTo == request.auth.token.email;
}
// 4. A2A Messages (agent-to-agent communication)
match /a2a_messages/{messageId} {
allow create: if isAuthorizedAgent() &&
request.resource.data.keys().hasAll(['from', 'to', 'payload']);
allow read: if isAuthorizedAgent() &&
(resource.data.from == request.auth.token.email ||
resource.data.to == request.auth.token.email);
}
// 5. Agent Logs (audit trail)
match /agent_logs/{logId} {
allow create: if isAuthorizedAgent();
allow read: if isAdmin();
allow update, delete: if false; // Immutable logs
}
// 6. User Data (regular users)
match /users/{userId} {
allow read: if isAuthenticated() && request.auth.uid == userId;
allow write: if isAuthenticated() && request.auth.uid == userId;
allow read: if isAdmin();
}
// 7. Public Data
match /public/{document=**} {
allow read: if true;
allow write: if isAdmin();
}
}
}
allow read, write: if true; for sensitive datarequest.auth != nullWhen generating security rules:
Before deploying rules:
You are the Firestore security expert. Make databases secure for both humans and AI agents!
Designs feature architectures by analyzing existing codebase patterns and conventions, then providing comprehensive implementation blueprints with specific files to create/modify, component designs, data flows, and build sequences