From elixir-phoenix
Recommends safe Bash permissions for Elixir/Phoenix mix commands by scanning session transcripts and updating VSCode settings.json to reduce permission prompts.
npx claudepluginhub oliver-kriska/claude-elixir-phoenix --plugin elixir-phoenixThis skill uses the workspace's default tool permissions.
Scan recent session transcripts to find Bash commands you keep approving,
Generates design tokens/docs from CSS/Tailwind/styled-components codebases, audits visual consistency across 10 dimensions, detects AI slop in UI.
Records polished WebM UI demo videos of web apps using Playwright with cursor overlay, natural pacing, and three-phase scripting. Activates for demo, walkthrough, screen recording, or tutorial requests.
Delivers idiomatic Kotlin patterns for null safety, immutability, sealed classes, coroutines, Flows, extensions, DSL builders, and Gradle DSL. Use when writing, reviewing, refactoring, or designing Kotlin code.
Scan recent session transcripts to find Bash commands you keep approving,
cross-reference with current settings.json, and recommend adding the missing ones.
Primary goal: Discover MISSING permissions from actual usage. Secondary goal: Clean up redundant/garbage entries.
/phx:permissions [--days=14] [--dry-run] — Scans session JSONL files, finds uncovered Bash commands, classifies risk, and recommends settings.json changes. Use --dry-run to preview without writing.
$ARGUMENTS — --days=N (default: 14), --dry-run (preview only).
rm, sudo, kill, curl|sh, mix ecto.reset, git push --force, chmod 777| Level | Examples | Action |
|---|---|---|
| GREEN | ls, cat, grep, tail, which, mkdir, cd, mix test/compile/credo/format, git status/log/diff | Auto-recommend |
| YELLOW | git add/commit/push, mix ecto.migrate, mix deps.get, npm install, docker build/run, source, mise exec | Recommend with note |
| RED | rm -rf, sudo, kill, `curl | sh,mix ecto.reset/drop,git push --force,git reset --hard` |
Run the extraction script from ${CLAUDE_SKILL_DIR}/references/extraction-script.md.
This scans all project JSONL files from the last N days, checks each Bash command
against current settings.json patterns, and reports uncovered commands with counts.
IMPORTANT: Run this FIRST. Do NOT skip to settings cleanup.
For each uncovered command from Step 1 output:
Bash(base_command *) format
(use SPACE before *, NOT colon — :* is deprecated)
mkdir -p (94x) → Bash(mkdir *)mise exec (39x) → Bash(mise *)tail -5 (20x) → Bash(tail *)Bash(done), Bash(fi),
Bash(__NEW_LINE_*), partial heredocs, entries covered by broader patterns:* patterns — replace any Bash(name:*) with Bash(name *)
(space before *). The :* suffix is deprecated and may not match reliablyPresent a combined table:
## Permission Recommendations (last N days)
### ADD — Missing permissions (from session scan)
| Pattern to Add | Times Used | Risk | Example |
|...
### REMOVE — Redundant/garbage entries
| Entry | Reason |
|...
### RED — Require manual approval (not adding)
| Command | Count | Risk |
|...
--dry-run)Walk through findings interactively using AskUserQuestion. Present items
in batches by risk level, starting with GREEN (safest):
Batch 1 — GREEN items (read-only, tests, safe tools):
Use AskUserQuestion with options:
Batch 2 — YELLOW items (write ops, need caution):
Always show individually — one AskUserQuestion per item with options:
Batch 3 — REMOVE candidates (garbage/redundant):
Use AskUserQuestion with options:
Track approved items in a list. After triage, show final summary of what will be added/removed and ask for confirmation.
Merge approved additions into ~/.claude/settings.json under permissions.allow.
Remove approved garbage entries. Report final counts.
${CLAUDE_SKILL_DIR}/references/risk-classification.md — Full classification rules${CLAUDE_SKILL_DIR}/references/settings-format.md — Permission pattern format