npx claudepluginhub metraton/gaia-opsKeeps you in the loop only when it matters. Gaia Security analyzes every command and classifies it into risk tiers: read-only queries run freely, simulations and validations pass through, and state-changing operations (create, delete, apply, push) pause for your explicit approval before executing. Irreversible commands like dropping databases or deleting cloud infrastructure are permanently blocked.
Claude Code marketplace entries for the plugin-safe Antigravity Awesome Skills library and its compatible editorial bundles.
Curated collection of 129 specialized Claude Code subagents organized into 10 focused categories
Directory of popular Claude Code extensions including development tools, productivity plugins, and MCP integrations
General Agentic Integration Architecture
Multi-agent DevOps system that classifies every operation by risk, routes work to specialist agents, and blocks irreversible commands automatically.
GAIA-Ops is a multi-agent orchestration system for DevOps automation. It provides security-first command classification, specialized AI agents, and plugin-based distribution. Currently integrates with Claude Code.
bash -c, eval, python -c wrappers that bypass regex patternsask dialog# Add the marketplace
/plugin marketplace add metraton/gaia-ops
# Install the full system (includes security)
/plugin install gaia-ops
# Or install security only
/plugin install gaia-security # Security hooks only
npm install @jaguilar87/gaia-ops
npx gaia-scan
# Run directly with npx
npx gaia-scan
# Or install globally
npm install -g @jaguilar87/gaia-ops
gaia-scan
This will:
.claude/ directory with symlinks to this packageproject-context.jsonsettings.json with hooks only (no permissions in settings.json)settings.local.json (preserves existing user config)No CLAUDE.md is generated -- orchestrator identity is injected dynamically by the UserPromptSubmit hook.
Gaia-Ops separates hooks from permissions:
| File | Content | Strategy |
|---|---|---|
settings.json | Hooks only (9 hook types) | Overwritten from template on each update |
settings.local.json | Permissions (allow + deny rules) | Union merge — never removes user config |
This ensures your personal customizations (MCP servers, extra permissions) survive updates.
npm install @jaguilar87/gaia-ops
Then create symlinks:
mkdir -p .claude && cd .claude
ln -s ../node_modules/@jaguilar87/gaia-ops/agents agents
ln -s ../node_modules/@jaguilar87/gaia-ops/tools tools
ln -s ../node_modules/@jaguilar87/gaia-ops/hooks hooks
ln -s ../node_modules/@jaguilar87/gaia-ops/commands commands
ln -s ../node_modules/@jaguilar87/gaia-ops/config config
ln -s ../node_modules/@jaguilar87/gaia-ops/templates templates
ln -s ../node_modules/@jaguilar87/gaia-ops/skills skills
ln -s ../node_modules/@jaguilar87/gaia-ops/speckit speckit
Once installed, the agent system is ready:
claude
The orchestrator identity is injected dynamically by the UserPromptSubmit hook. Skills are loaded on-demand.
Skills and injection diagnosis:
npx gaia-skills-diagnose
# or with test probe:
npx gaia-skills-diagnose --run-tests
Gaia-Ops enforces a 6-layer security pipeline:
| Layer | Mechanism | Bypassable? |
|---|---|---|
| Indirect execution detection | bash -c, eval, python -c wrappers | No (hook-level) |
| Blocked commands (regex) | 85+ regex patterns | No (symlink to npm package) |
| Blocked commands (semantic) | 70+ ordered-token rules | No (symlink to npm package) |
| Cloud pipe validator | Credential piping detection | No (hook-level) |
| Mutative verb detection | ask dialog for state-changing ops | User approves via native dialog |
| Settings deny rules | 147 deny rules in settings.local.json | Self-healing (restored each session) |
For organization-wide enforcement, deploy templates/managed-settings.template.json as a managed settings policy via Claude.ai Admin Console. Managed settings have the highest precedence and cannot be overridden.