18 KiB
ktg-plugin-marketplace
Open-source Claude Code plugins for AI-assisted development, security, and planning.
Built for my own Claude Code workflow and shared openly for anyone who finds them useful. Solo project — bug reports and feature requests are welcome, pull requests are not accepted.
AI-generated code disclosure
All code in this marketplace is generated by Claude Code through a dialog-based process. I direct, review, test, and validate; Claude writes. Every commit reflects this — treat the plugins as AI-authored, human-curated.
Installation
claude plugin marketplace add https://git.fromaitochitta.com/open/ktg-plugin-marketplace.git
Then open Claude Code and type /plugin to browse and install plugins from the marketplace.
Compatibility
- Claude Code CLI, desktop app, and IDE extensions
- macOS, Linux, Windows
- No external dependencies (all scanners and hooks are self-contained)
Plugins
LLM Security v7.2.0
Security scanning, auditing, and threat modeling for agentic AI projects.
Built on OWASP LLM Top 10 (2025), OWASP Agentic AI Top 10, and the AI Agent Traps taxonomy (Google DeepMind, 2025). Three layers of protection:
- Automated enforcement — 9 hooks that block dangerous operations in real time (prompt injection, secrets in code, destructive commands, supply chain guardrails, transcript scanning before context compaction)
- Deterministic scanning — 22 Node.js scanners (10 orchestrated + 12 standalone) for byte-level analysis: Shannon entropy, Unicode codepoints, typosquatting detection, taint flow, DNS resolution, git forensics, AI-BOM, attack simulation, IDE extension prescan (VS Code + JetBrains — URL fetch from Marketplace / OpenVSX / direct VSIX / JetBrains Marketplace, hardened ZIP extractor for zip-slip / symlinks / bombs, plus OS sandbox via
sandbox-exec/bwrapso the kernel enforces FS confinement). Bash-normalize T1-T6 for obfuscation-resistant denylists - Advisory analysis — 19 commands that scan, audit, and model threats with structured reports, letter grades, and actionable remediation
- Enterprise governance — Compliance mapping (EU AI Act, NIST AI RMF, ISO 42001), SARIF 2.1.0 output, structured audit trail, policy-as-code, standalone CLI
- Opus 4.7 aligned — Agent instructions rewritten for literal instruction-following (system card §6.3.1.1), defense-in-depth posture per §5.2.1, production hardening guide
Key commands: /security posture, /security audit, /security scan, /security ide-scan, /security threat-model, /security plugin-audit
6 specialized agents · 22 scanners · 9 hooks · 20 knowledge docs · 1511 tests
Config-Audit v4.0.0
Configuration intelligence for Claude Code — health checks, feature discovery, auto-fix, active-config inventory, and Opus-4.7-aware token-cost analysis.
Claude Code reads instructions from 7+ file types across multiple scopes. This plugin tells you what's wrong, what's missing, what's silently conflicting, what's actually loaded, and where you're burning tokens unnecessarily:
- Health — 8 deterministic scanners verify correctness across every configuration file (broken imports, deprecated settings, conflicting rules, permission contradictions, and Opus-4.7-era token waste)
- Opportunities — context-aware recommendations for Claude Code features you're not using
- Action — auto-fix with mandatory backups, syntax validation, rollback support, and human-in-the-loop workflow
- What's active — read-only inventory of plugins, skills, MCP servers, hooks, and CLAUDE.md cascade for a repo, with token estimates
- Token hotspots —
/config-audit tokensranks files by estimated waste against 4 Opus-4.7 patterns (cache-breaking volatile content, redundant tool permissions, deep import chains, sonnet-era setups)
Key commands: /config-audit posture, /config-audit feature-gap, /config-audit fix, /config-audit whats-active, /config-audit tokens
6 agents · 9 scanners · 17 commands · 543+ tests
Ultra {brief | research | architect | plan | execute} - local v2.4.0
Deep requirements gathering, research, Claude Code feature matching, implementation planning, self-verifying execution, and skill-factory authoring with specialized agent swarms, adversarial review, IP-hygiene scoring, and failure recovery.
Five core commands plus an authoring command, one pipeline with clear division of labor:
/ultrabrief-local— Capture intent. Dynamic, quality-gated interview: a section-driven completeness loop (Phase 3) followed by abrief-reviewerstop-gate (Phase 4, max 3 review iterations). Required sections must reach an initial-signal gate AND pass review across completeness, consistency, testability, scope clarity, and research-plan validity beforebrief.mdis written. Identifies research topics with copy-paste-ready/ultraresearch-localcommands. Optional auto-orchestration runs research + planning in foreground. Always interactive./ultraresearch-local— Gather context. Deep multi-source research with triangulation: 5 local agents + 4 external agents + Gemini bridge, producing structured briefs with confidence ratings. Makes no build decisions./ultra-cc-architect-local(optional, v2.2) — Match Claude Code features to the task. Readsbrief.md+research/*.md, consults a seeded CC-feature catalog skill (hooks, subagents, skills, output styles, MCP, plan mode, worktrees, background agents), and producesarchitecture/overview.mdwith brief-anchored rationale plusarchitecture/gaps.mdwith issue-ready drafts for missing catalog entries. Hallucination gate (enforced byarchitecture-critic) blocks proposals for features not covered by the catalog./ultraplan-local— Transform intent into an executable contract. Per-step YAML manifests (expected_paths,commit_message_pattern,bash_syntax_check). Plan-critic is a hard gate on manifest quality. Requires a task brief as input (--briefor--project). Auto-discovers the architecture note when present and cross-references itscc_features_proposedagainst exploration findings./ultraexecute-local— Execute the contract disciplined. Manifest-based verification, independent Phase 7.5 audit from git log + filesystem (ignores agent bookkeeping), Phase 7.6 bounded recovery dispatch for missing steps. Step 0 pre-flight catches sandbox push-denial before any work.--validatemode offers a fast schema-only sanity-check between planning and execution./ultra-skill-author-local(authoring, v2.3, skill-factory Fase 1) — Generate onecc-architect-catalogdraft skill from a curated local source file with IP-hygiene enforcement. Sequential pipeline:concept-extractor→skill-drafter→ip-hygiene-checker. Drafts land inskills/cc-architect-catalog/.drafts/for manual review andmvpromotion. Pure-Node n-gram containment scorer (scripts/ngram-overlap.mjs) enforces verdict bands; rejected drafts are deleted. Channel 2 of the skill-factory strategy — manual, one-source-at-a-time, no automation.
All artifacts land in one project directory: .claude/projects/{YYYY-MM-DD}-{slug}/ contains brief.md, research/NN-*.md, architecture/ (v2.2), plan.md, sessions/, and progress.json. --project <dir> works across /ultraresearch-local, /ultra-cc-architect-local, /ultraplan-local, and /ultraexecute-local.
v2.4.0 (breaking, default behavior) removes background mode from /ultraplan-local, /ultraresearch-local, /ultra-cc-architect-local, and /ultrabrief-local auto-mode. The commands now run foreground in the main context because the harness does not expose the Agent tool to sub-agents — background orchestrators silently degraded the swarm to inline reasoning without external research tools. The --fg flag is preserved as a no-op alias for backward compatibility. Source: github.com/anthropics/claude-code/issues/19077.
v2.3 (non-breaking) ships the skill-factory Fase 1 MVP: /ultra-skill-author-local plus four supporting agents (1 opus orchestrator + 3 sonnet workers) and scripts/ngram-overlap.mjs (pure Node stdlib, word-5-gram containment + longest-run secondary signal, calibrated against three source/draft fixture pairs). Catalog growth is now tractable without touching the architect's hallucination gate. Non-goals stay explicit: no automation, no batch, no decision-layer skills, no remote sources — manual mv from .drafts/ to catalog root is the promotion mechanism. v2.3.1 adds a qualified-slug convention (<cc_feature>[-<qualifier>]-<layer>.md) so one feature can host multiple named patterns at different abstraction levels without displacing the baseline — resolved a collision surfaced in v2.3.0 dogfood. v2.3.2 closes the UX gap: skill-drafter now reads {catalog_root}/<slug>.md before writing and surfaces a collision warning in its confirmation output with a suggested qualified slug, so users see the overwrite risk before running mv — not after.
v2.2 (non-breaking) adds the optional /ultra-cc-architect-local step between research and planning. The architect phase is backed by a versioned catalog skill (cc-architect-catalog) with 10 seed entries across three layers (reference, pattern, decision). Gaps are captured as issue-ready drafts so the catalog grows from real usage rather than speculation. /ultraplan-local auto-discovers the architecture note — existing pipelines keep working unchanged.
v2.1 (non-breaking) replaced the hardcoded Q1–Q8 interview with a dynamic, quality-gated loop; brief-reviewer emits machine-readable per-dimension JSON scores so /ultrabrief-local can use it as an internal stop-gate. v2.0 (breaking) extracted the interview from planning: briefs are reviewable artifacts that downstream agents (brief-reviewer, plan-critic, scope-guardian) validate independently. /ultraplan-local requires --brief or --project. See plugins/ultraplan-local/MIGRATION.md.
v1.7 self-verifying chain (preserved): a step may not be marked completed unless its manifest verifies. v1.8 Opus 4.7 literalism fixes (preserved): literal Step+Manifest template, forbidden narrative headers, schema self-check.
Defense-in-depth security: plugin hooks block destructive commands and sensitive path writes, prompt-level denylist works in headless sessions, pre-execution plan scan catches dangerous commands before they run, scoped --allowedTools replaces --dangerously-skip-permissions in parallel sessions.
Modes: default, brief-driven, project-scoped, research-enriched, architect (optional), foreground, quick, decompose, export
23 specialized agents · 5 commands · 1 skill (CC-feature catalog, 10 seeds) · 2 security hooks · No cloud dependency
→ Full documentation · Migration guide
AI Psychosis v1.0.0
Meta-awareness tools that counteract sycophancy, reinforcement loops, and compulsive AI interaction patterns.
AI assistants are structurally optimized to be agreeable. This creates reinforcement loops where productive collaboration is often a mirror showing you what you want to see. Research documents psychotic episodes triggered by sustained AI interaction in individuals with no prior psychiatric history.
- Layer 1 — Behavioral instructions — SKILL.md rules that modify Claude's behavior: no unearned affirmations, mandatory risk identification, pattern naming
- Layer 2 — Programmatic detection — 4 hooks that measure session duration, dependency language, rapid-fire bursts, edit ratios, and late-night usage with progressive alerts
- Layer 3 — Interaction reports —
/interaction-reportslash command for aggregated session statistics across configurable timeframes (weekly, monthly, all-time). Opt-in - Layer 4 — Contemplative references — optional references to contemplative approaches when interaction flags are elevated. Opt-in
Research-informed thresholds. Alerts are progressive and never blocking. Privacy-first: prompt text is never logged. Layers 3 and 4 are off by default.
1 skill · 1 command · 4 hooks
Graceful Handoff v1.0.0
Session handoff in under 60 seconds. Built for context-constrained models like Opus 4.7 where sessions fill fast.
When you hit 60-70% context and have to start a new session, three things usually get rushed or forgotten: summarizing state, committing finished work, and writing a continuation prompt. /graceful-handoff does all three in one step.
- Auto-detect handoff type — multi-session (active ultraplan project), plugin-work (inside a marketplace plugin), or single-task (fallback)
- Writes
NEXT-SESSION-PROMPT.local.md— 7-section artifact (why, status, how to continue, push-policy, verification, gotchas) matching the established pattern in llm-security and config-audit - Auto-commit + push — generates Conventional Commits message from
git diff --stat, respects pre-commit hooks (secrets, pathguard), pushes to Forgejo.--no-commitskips - Copy-paste prompt for next session — the critical output, always printed even if everything else fails
- No subagents, no web — entirely inline in the main session, under 60 seconds budget
Key command: /graceful-handoff [topic-slug] [--no-commit] [--dry-run]
1 command · 0 hooks · 0 agents · declarative markdown
MS AI Architect — Azure AI and Microsoft Foundry v1.8.0 🇳🇴 Norwegian
Microsoft AI solution architecture guidance for Norwegian public sector and enterprise.
Meet Cosmo Skyberg — a structured architect persona who understands the problem before recommending technology. Every recommendation is grounded in 387 reference documents and verified against live Microsoft Learn documentation via MCP:
- Structured advisory — 7-phase methodology from business need to architecture recommendation and optional diagram
- Regulatory assessments — ROS analysis (NS 5814), DPIA/PVK, security scoring (6×5), EU AI Act classification, cost estimation in NOK (P10/P50/P90)
- Norwegian public sector — Digdir architecture principles, Utredningsinstruksen, NSM, Schrems II data residency, EU AI Act compliance workflow
- Automated freshness — sitemap-based change detection polls Microsoft Learn weekly, flags which reference files need updating based on source page changes, and discovers new relevant pages
Key commands: /architect, /architect:ros, /architect:security, /architect:dpia, /architect:utredning, /architect:cost
12 specialized agents · 24 commands · 5 skills (387 reference docs) · 2 hooks · sitemap-based KB monitoring
LinkedIn Thought Leadership v1.2.0
Build authentic LinkedIn authority through algorithmic understanding, strategic consistency, and AI-assisted content creation.
Updated for the January 2026 360Brew algorithm change, which validates your creator profile before distributing content. v1.2.0 reduces friction: auto-clipboard on all content commands, max 2 interactive steps per post, deterministic state management, MCP image carousel pipeline, progressive onboarding, and iCal calendar integration for batch scheduling.
- Guided onboarding —
/linkedin:onboardingwalks new users through profile → setup → first post in one flow - 360Brew profile optimization — audit your profile against LinkedIn's creator validation criteria
- Full content pipeline — ideation, drafting, publishing, 48-hour monitoring, and analytics
- Content Matrix System — 40+ post ideas from a single topic using 8 universal angles and 48 industry-specific variants
- Voice training — learns your authentic writing style and detects drift with 6-dimension scoring
- Analytics pipeline — import LinkedIn CSV exports, weekly/monthly reports, day-of-week heatmap
- Growth strategy — phase-specific guidance from foundation (0-1K followers) through authority (10K+)
Key commands: /linkedin:onboarding, /linkedin:post, /linkedin:quick, /linkedin:carousel, /linkedin:react, /linkedin:report
16 specialized agents · 27 commands · 6 skills · 9 hooks · 24 reference docs
OKR for Public Sector v1.3.0 🇳🇴 Norwegian
Turn strategy into measurable goals. An AI coach that learns your organization, tracks progress across cycles, and guides you from first OKR to organizational mastery.
Most OKR tools explain methodology. This plugin knows your organization. After a one-time onboarding conversation, it remembers your maturity level, strategic goals, current OKR, and cultural challenges. Every interaction builds on that knowledge — so you spend time on strategy, not re-explaining context.
- Strategy to OKR — transform goals from virksomhetsplan, tildelingsbrev, or any strategic document into well-structured OKR with guided writing, quality checks, and alignment scoring
- Gap analysis —
/okr:gapcompares your strategic documents against current OKR and shows what's covered, what's missing, and what to do about it - Cross-cycle learning —
/okr:analysetracks score trends, recurring antipatterns, and alignment progress across cycles with visual charts - Proactive coaching — automatically tells you where you are in the cycle and what to focus on — progress checks mid-cycle, retrospective prep near the end
- 19 antipattern detection — catches sandbagging, activity-disguised-as-KR, set-and-forget, and 16 more named failure modes before they take root
- Built for norsk offentlig sektor — 4-month tertials, DFO terminology, tillitsvalgt involvement, Riksrevisjon-ready documentation, governance chain from Stortingsmelding to team OKR
Key commands: /okr:skriv, /okr:kvalitet, /okr:gap, /okr:analyse, /okr:kaskade, /okr:sporing, /okr:governance, /okr:oppsett
7 agents · 10 commands · 4 hooks · 16 reference docs
License
MIT