From plaited-plaited
Scaffold protected remote MCP skills for generic tool execution using repo-native auth config, env or Varlock-resolved secrets, and optional external refresh-material storage.
npx claudepluginhub joshuarweaver/cascade-code-general-misc-3 --plugin plaited-plaitedThis skill is limited to using the following tools:
Use this skill when a remote MCP server is protected by OAuth, minted bearer tokens, or other
Applies Acme Corporation brand guidelines including colors, fonts, layouts, and messaging to generated PowerPoint, Excel, and PDF documents.
Builds DCF models with sensitivity analysis, Monte Carlo simulations, and scenario planning for investment valuation and risk assessment.
Calculates profitability (ROE, margins), liquidity (current ratio), leverage, efficiency, and valuation (P/E, EV/EBITDA) ratios from financial statements in CSV, JSON, text, or Excel for investment analysis.
Use this skill when a remote MCP server is protected by OAuth, minted bearer tokens, or other operator-managed secrets that must not be committed into the repository.
This skill is intentionally for generic MCP tool execution. The wrapper templates accept arbitrary
JSON tool arguments that match the MCP tool schema. They do not assume a { "query": "..." }
shape.
tokenPersistence in checked-in config is metadata for operators and future adapters. Actual
persisted refresh-material handling still comes from a runtime refreshMaterialStore.resolveConfiguredRemoteMcpOptions.MCP_URL, TOOL_NAME, and a checked-in ConfiguredRemoteMcpOptions object.bunx varlock run -- bun ....refreshMaterialStore.const REMOTE_MCP = {
auth: {
type: 'bearer-env',
token: {
envVar: 'MY_MCP_ACCESS_TOKEN',
storage: { kind: 'varlock-1password', reference: 'op://team/service/access-token' },
},
},
}
const REMOTE_MCP = {
auth: {
type: 'oauth-client-credentials',
tokenUrl: 'https://issuer.example.com/oauth/token',
clientId: {
envVar: 'MY_MCP_CLIENT_ID',
storage: { kind: 'env' },
},
clientSecret: {
envVar: 'MY_MCP_CLIENT_SECRET',
storage: { kind: 'varlock-1password', reference: 'op://team/service/client-secret' },
},
scopes: ['mcp:tools'],
},
}
const REMOTE_MCP = {
auth: {
type: 'oauth-refresh-token',
tokenUrl: 'https://issuer.example.com/oauth/token',
clientId: {
envVar: 'MY_MCP_CLIENT_ID',
storage: { kind: 'env' },
},
clientSecret: {
envVar: 'MY_MCP_CLIENT_SECRET',
storage: { kind: 'varlock-1password' },
},
refreshToken: {
envVar: 'MY_MCP_REFRESH_TOKEN',
storage: { kind: 'varlock-1password' },
},
tokenPersistence: { kind: 'system-keychain', key: 'com.example.mcp/service' },
},
}
add-remote-mcpUse add-remote-mcp for public endpoints and simple static-header or bearer-env cases where you mainly need discovery or a lightweight wrapper.
Use this protected skill when the server needs OAuth, rotated refresh material, or a generic
tool-execution wrapper that should hide auth-provider construction behind the plaited/mcp
library.