SSH/GPG Rules
Secure shell connections and GPG key management. Generate keys, configure agents, and manage remote access.
3 rules
authorized_keys Security Standards
Advanced
Standards for managing authorized_keys files — key restrictions, command forcing, environment options, source IP limits, and regular audit requirements.
globs: **/.ssh/authorized_keys, **/authorized_keys
authorized-keys, access-control, restrictions, security
View Rule
SSH Config File Structure
Intermediate
Standards for ~/.ssh/config organization — section ordering, wildcard placement, required Host * defaults, IdentitiesOnly enforcement, and security-first settings.
globs: **/.ssh/config, **/ssh_config
ssh-config, organization, security, structure
View Rule
SSH Key Generation Standards
Beginner
Enforce Ed25519 key generation, passphrase requirements, per-device key policy, naming conventions, and proper file permissions for SSH key management.
globs: **/.ssh/**, **/ssh_config, **/sshd_config
ssh-keys, ed25519, key-generation, permissions
View Rule