| Version | Supported |
|---|---|
| 1.0.x | Yes |
memoriant-env-bootstrap-skill is a Claude Code plugin that scans project directories for stack signal files and generates shell scripts and Markdown documentation. It contains no executable server code, no network calls, no authentication logic, and no credential handling.
- Reads project directory structure and specific signal files (e.g.,
requirements.txt,package.json,.env.example) from the local filesystem. - Writes a
bootstrap.shshell script andONBOARDING.mdMarkdown file to a user-specified output directory. - Does not execute any generated scripts.
- Does not read
.envfiles that may contain credentials — only reads.env.exampleor.env.templateplaceholder files.
It does not:
- Execute code from the scanned project.
- Make network requests.
- Store or transmit project file contents outside the local filesystem.
- Require API keys or credentials of any kind.
- Write credentials or secrets into generated files.
The plugin explicitly avoids reading .env files. When a .env.example or .env.template file is found, the generated bootstrap.sh copies it to .env and instructs the developer to fill in real values manually. No actual credential values are ever written into generated files.
Every generated bootstrap.sh uses set -euo pipefail to exit on error and avoid silent failures. Scripts contain only generic, open-source commands. Company-internal commands, hardcoded secrets, and proprietary tooling are never included.
If you discover a security concern in this plugin — for example, a path traversal issue in directory scanning, credential leakage in generated scripts, or prompt injection in skill instruction files — please report it responsibly.
Contact: Open a GitHub Security Advisory on this repository.
Please include:
- A clear description of the issue.
- Steps to reproduce.
- The potential impact.
Do not open a public issue for security vulnerabilities.
- Acknowledgement within 5 business days.
- Assessment and patch (if warranted) within 30 days.
All skill and agent definitions in this plugin are plain Markdown files. They contain no executable code, no shell scripts, no binary blobs, and no network-facing logic. They are safe to audit as plain text.