OPA image security policies for container registry allowlisting, digest enforcement, and signature verification in Kubernetes.
Enforces OPA policies for container image security including registry allowlisting, digest enforcement, and signature verification. Use when deploying to Kubernetes to prevent supply chain attacks and ensure image integrity.
/plugin marketplace add adaptive-enforcement-lab/claude-skills/plugin install enforce@ael-skillsThis skill inherits all available tools. When active, it can use any tool Claude has access to.
examples.mdreference.mdscripts/example-1.shscripts/example-10.shscripts/example-11.shscripts/example-12.shscripts/example-13.shscripts/example-14.shscripts/example-15.regoscripts/example-16.shscripts/example-17.shscripts/example-2.shscripts/example-3.shscripts/example-4.shscripts/example-5.yamlscripts/example-6.yamlscripts/example-7.yamlscripts/example-8.yamlscripts/example-9.shImage security policies control which container images can run in your cluster. These templates enforce registry allowlists, require immutable digests, and validate cryptographic signatures.
Image Tags Are Mutable
Tags like
latestorv1.2.3can be overwritten by attackers who compromise registries. Use digest-based references (sha256:...) for immutable deployments.
Prevent deployment of images from untrusted sources:
# Enforced by: base.yaml
# Result: Only images from registry.company.com allowed
# Impact: Eliminates supply chain attacks via public registries
Require digest-based image references:
# Enforced by: digest.yaml
# Result: Image references must use @sha256:... format
# Impact: Guarantees deployed image matches approved version
Reject images with known CVEs:
# Enforced by: security.yaml
# Result: Images must have scan results with no high/critical vulnerabilities
# Impact: Prevents deployment of exploitable container images
Validate cryptographic signatures on all images:
# Enforced by: verification.yaml
# Result: Images must be signed by trusted key in KMS
# Impact: Ensures images originated from approved CI/CD pipelines
See the full implementation guide in the source documentation.
See examples.md for code examples.
See reference.md for complete documentation.
Creating algorithmic art using p5.js with seeded randomness and interactive parameter exploration. Use this when users request creating art using code, generative art, algorithmic art, flow fields, or particle systems. Create original algorithmic art rather than copying existing artists' work to avoid copyright violations.
Applies Anthropic's official brand colors and typography to any sort of artifact that may benefit from having Anthropic's look-and-feel. Use it when brand colors or style guidelines, visual formatting, or company design standards apply.
Create beautiful visual art in .png and .pdf documents using design philosophy. You should use this skill when the user asks to create a poster, piece of art, design, or other static piece. Create original visual designs, never copying existing artists' work to avoid copyright violations.