Skip to content

Managing Plugins

Plugins extend Claude Code with additional capabilities. As a team leader, you select which plugins your team uses.

Plugins come from marketplaces—repositories of approved plugins.

The official marketplace is maintained by SCC:

{
"marketplaces": {
"sandboxed-code-official": {
"source": "github",
"owner": "CCimen",
"repo": "sandboxed-code-plugins"
}
}
}

Your organization may have internal marketplaces:

{
"marketplaces": {
"internal-tools": {
"source": "github",
"owner": "your-org",
"repo": "scc-plugins"
}
}
}
plugin-name@marketplace-name

Examples:

  • scc-safety-net@sandboxed-code-official
  • java-analyzer@internal-tools
  • react-devtools@frontend-marketplace
{
"additional_plugins": [
"scc-safety-net@sandboxed-code-official",
"java-analyzer@internal-tools",
"spring-boot-helper@internal-tools"
]
}

The most important plugin. Blocks destructive git commands:

Blocked CommandWhy
git push --forceOverwrites remote history
git reset --hardDiscards uncommitted changes
git branch -DForce-deletes branches
git clean -fdDeletes untracked files
git checkout/restoreCan overwrite local changes

Enable in your config:

"additional_plugins": [
"scc-safety-net@sandboxed-code-official"
]

Organization admins can block plugins by pattern:

{
"security": {
"blocked_plugins": [
"*experimental*",
"*beta*",
"untrusted-*"
]
}
}

Even if you add these to your team config, they will be filtered out.

Your additions must:

  1. Come from an approved marketplace
  2. Not match any blocked_plugins pattern
  3. Match allowed_plugins pattern (if org specifies one)

You can let developers add project-specific plugins:

{
"delegation": {
"allow_additional_plugins": ["team-*", "project-*"]
}
}

This lets developers add plugins matching those patterns in their .scc.yaml.

{
"delegation": {
"allow_additional_plugins": []
}
}

Developers cannot add any plugins beyond team defaults.

{
"delegation": {
"allow_additional_plugins": ["*"]
}
}

Developers can add any non-blocked plugin from approved marketplaces.

See what plugins are currently installed:

Terminal window
scc audit plugins

Output:

Team: backend
Effective plugins:
✓ scc-safety-net@sandboxed-code-official (from: team)
✓ java-analyzer@internal (from: team)
✓ project-linter@internal (from: project/.scc.yaml)
Blocked plugins (attempted but filtered):
✗ experimental-tool@internal (matches: *experimental*)
  1. Check it’s in an approved marketplace

    Terminal window
    scc config explain --field marketplaces
  2. Check it’s not blocked

    Terminal window
    scc config explain --field blocked_plugins
  3. Check spelling of plugin and marketplace names

  4. Force refresh config

    Terminal window
    scc update --force

The plugin matches a blocked_plugins pattern. Contact your org admin if you believe this is incorrect.

Ensure everyone has the latest config:

Terminal window
scc update

Check effective config:

Terminal window
scc config explain --field plugins