Help us improve
Share bugs, ideas, or general feedback.
From build-macos-apps
Inspect signing, entitlements, hardened runtime, and Gatekeeper issues for macOS apps. Use when asked to diagnose code signing failures, missing entitlements, sandbox problems, notarization prerequisites, or trust-policy launch errors.
npx claudepluginhub robinebers/converted-plugins --plugin build-macos-appsHow this skill is triggered — by the user, by Claude, or both
Slash command
/build-macos-apps:signing-entitlementsThe summary Claude sees in its skill listing — used to decide when to auto-load this skill
Use this skill when the failure smells like codesigning rather than compilation:
Mandates invoking relevant skills via tools before any response in coding sessions. Covers access, priorities, and adaptations for Claude Code, Copilot CLI, Gemini CLI.
Share bugs, ideas, or general feedback.
Use this skill when the failure smells like codesigning rather than compilation: launch refusal, missing entitlement, invalid signature, sandbox mismatch, hardened runtime confusion, or trust-policy rejection.
Inspect the bundle or binary.
.app or executable.Contents/MacOS/.Read signing details.
codesign -dvvv --entitlements :- <path>.spctl -a -vv <path> when Gatekeeper behavior matters.plutil -p for entitlements or Info.plist inspection.Classify the failure.
Explain the minimum fix path.
codesign -dvvv --entitlements :- <app-or-binary>spctl -a -vv <app-or-binary>security find-identity -p codesigning -vplutil -p <path-to-entitlements-or-plist>Provide: