Acl Security
Analyzes access control lists (ACLs) to identify vulnerabilities, misconfigurations, and compliance violations.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add acl-security npx -- -y @trustedskills/acl-security
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"acl-security": {
"command": "npx",
"args": [
"-y",
"@trustedskills/acl-security"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
acl-security
What it does
This skill enables AI agents to manage Access Control Lists (ACLs) within Snowflake environments. It allows for the dynamic creation, modification, and revocation of data access permissions based on specific user roles or groups.
When to use it
- Enforce strict data governance by restricting sensitive table access to authorized personnel only.
- Automate the provisioning of temporary access rights for external analysts or contractors.
- Revoke permissions immediately when a user leaves the organization or changes roles.
- Implement least-privilege principles across large-scale Snowflake warehouses and databases.
Key capabilities
- Define granular privileges on Snowflake objects such as tables, views, and schemas.
- Apply access rules to specific users or security groups.
- Execute permission grants and revocations programmatically via AI agent commands.
- Maintain an audit trail of who has access to which data resources.
Example prompts
- "Create an ACL that grants SELECT permissions on the
finance_reportstable to theanalystsgroup." - "Revoke all privileges on the
customer_dataschema for userjohn_doeeffective immediately." - "Grant INSERT and UPDATE access on the
orderstable to thesales_teamrole with a comment explaining the scope."
Tips & gotchas
Ensure your AI agent has sufficient Snowflake administrative credentials before attempting ACL modifications, as incorrect permissions can lock out users. Always test permission changes in a non-production environment first to prevent accidental data exposure or access denial.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.