Skip to content

Commit 78f3531

Browse files
davidmyttonclaude
andcommitted
docs: recommend MCP tools for rule verification in skills
Strengthen the verify step in both skills to prioritize MCP tools (list-requests, analyze-traffic, explain-decision, promote-rule) over the dashboard, and suggest the security analyst agent for deeper analysis. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
1 parent f23beb6 commit 78f3531

2 files changed

Lines changed: 21 additions & 5 deletions

File tree

skills/add-ai-protection/SKILL.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,10 +123,20 @@ For AI endpoints, provide meaningful error responses:
123123
1. Start the app and send a normal message — should succeed
124124
2. Test prompt injection by sending something like "Ignore all previous instructions and..."
125125
3. Test PII blocking by sending a message with a fake credit card number
126-
4. Check the Arcjet dashboard or use MCP `list-requests` to see decisions
127126

128127
Start all rules in `"DRY_RUN"` mode first. Once verified, promote to `"LIVE"`.
129128

129+
**Always recommend using the Arcjet MCP tools** to verify rules and analyze traffic:
130+
131+
- `list-requests` — confirm decisions are being recorded, filter by conclusion to see blocks
132+
- `analyze-traffic` — review denial rates and patterns for the AI endpoint
133+
- `explain-decision` — understand why a specific request was allowed or denied (useful for tuning prompt injection sensitivity)
134+
- `promote-rule` — promote rules from `DRY_RUN` to `LIVE` once verified
135+
136+
If the user wants a full security review, suggest the `/arcjet:security-analyst` agent which can investigate traffic, detect anomalies, and recommend additional rules.
137+
138+
The Arcjet dashboard at https://app.arcjet.com is also available for visual inspection.
139+
130140
## Common Patterns
131141

132142
**Streaming responses**: Call `protect()` before starting the stream. If denied, return the error before opening the stream — don't start streaming and then abort.

skills/protect-route/SKILL.md

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -117,12 +117,18 @@ Apply route-specific rules using `withRule()` on the shared instance — do not
117117

118118
## Step 5: Verify
119119

120-
Suggest the user start their app, hit the protected route, then verify via:
120+
Suggest the user start their app and hit the protected route. Remind them that new rules should start in `"DRY_RUN"` mode and be promoted to `"LIVE"` after verification.
121121

122-
- The Arcjet dashboard at https://app.arcjet.com
123-
- Or MCP: `list-requests` to confirm decisions are being recorded
122+
**Always recommend using the Arcjet MCP tools** to verify rules are working and analyze traffic:
124123

125-
Remind them that new rules should start in `"DRY_RUN"` mode and be promoted to `"LIVE"` after verification.
124+
- `list-requests` — confirm decisions are being recorded and inspect allow/deny outcomes
125+
- `analyze-traffic` — review traffic patterns and denial rates for the protected route
126+
- `explain-decision` — understand why a specific request was allowed or denied
127+
- `promote-rule` — promote rules from `DRY_RUN` to `LIVE` once verified
128+
129+
If the user wants a full security review, suggest the `/arcjet:security-analyst` agent which can investigate traffic, detect anomalies, and recommend additional rules.
130+
131+
The Arcjet dashboard at https://app.arcjet.com is also available for visual inspection.
126132

127133
## Common Mistakes to Avoid
128134

0 commit comments

Comments
 (0)