Skillquality 0.47

bridge-origin-safe-slash-override

Keep remote slash-command skipping enabled by default, then reopen it only for bridge-safe commands while denying unsafe local commands with a friendly local response.

Price
free
Protocol
skill
Verified
no

What it does

SKILL: Bridge Origin Safe Slash Override

Domain: remote-input-safety Trigger: Apply when remotely delivered input should still default to plain-text slash handling, but a trusted bridge path needs to selectively re-enable only the slash commands that are safe to execute remotely. Source Pattern: Distilled from reviewed remote-control, bridge transport, and capability-advertising implementations.

Core Method

Keep remote slash-command parsing disabled by default for bridge-delivered input. If a remote message starts with /, inspect it locally first and resolve whether it maps to a known command. Re-enable slash handling only when the resolved command is explicitly bridge-safe; otherwise, intercept unsafe known commands with a friendly local denial and leave unknown slash text as plain text. This preserves the defensive default while still allowing a narrow, reviewed remote command surface.

Key Rules

  • Preserve the “treat slash text as plain text” default at enqueue time so every other fast path still sees the defensive baseline.
  • Reopen slash handling only after all three checks pass: the message is bridge-originated, starts with /, and resolves to a command that passes bridge-safety filtering.
  • Treat known unsafe commands, especially local-jsx or terminal-only ones, as a local UX case rather than a model prompt: return a friendly denial such as "config isn't available over Remote Control." and stop before querying.
  • Let unknown or malformed slash text fall through as plain text rather than converting it into a new local error surface for remote users.
  • Keep discovery aligned with execution by advertising only bridge-safe commands to remote clients whenever possible; the override should narrow execution, not widen the visible command set.

Example Application

A mobile bridge sends /deploy-docs. The bridge layer parses it locally, confirms it is on the remote-safe allowlist, and then hands it to normal slash-command execution. The same bridge sends /config; the command resolves but is not remote-safe, so the system responds locally with a denial message. If the bridge sends /shrug and that text does not resolve to a known command, it stays plain text and is handled like an ordinary message.

Anti-Patterns (What NOT to do)

  • Do not disable slash skipping for all bridge traffic up front; that reopens the exact remote-command surface the default suppression was meant to close.
  • Do not pass known unsafe slash commands through as ordinary model text; the model should not have to interpret config after local policy already knows it is disallowed remotely.
  • Do not reject unknown bridge slash text with a new "Unknown skill" style error; preserving plain-text fallback avoids breaking ordinary remote messages that happen to start with /.

Capabilities

skillsource-ychampionskill-bridge-origin-safe-slash-overridetopic-agent-skillstopic-ai-agentstopic-clitopic-coding-agentstopic-context-engineeringtopic-developer-toolstopic-mcptopic-multi-agenttopic-terminal-ui

Install

Quality

0.47/ 1.00

deterministic score 0.47 from registry signals: · indexed on github topic:agent-skills · 34 github stars · SKILL.md body (2,820 chars)

Provenance

Indexed fromgithub
Enriched2026-04-22 06:56:45Z · deterministic:skill-github:v1 · v1
First seen2026-04-18
Last seen2026-04-22

Agent access