Managing Plugins
Plugins extend Claude Code with additional capabilities. As a team leader, you select which plugins your team uses.
Understanding Plugin Sources
Section titled “Understanding Plugin Sources”Plugins come from marketplaces—repositories of approved plugins.
Official Marketplace
Section titled “Official Marketplace”The official marketplace is maintained by SCC:
{ "marketplaces": { "sandboxed-code-official": { "source": "github", "owner": "CCimen", "repo": "sandboxed-code-plugins" } }}Custom Marketplaces
Section titled “Custom Marketplaces”Your organization may have internal marketplaces:
{ "marketplaces": { "internal-tools": { "source": "github", "owner": "your-org", "repo": "scc-plugins" } }}Adding Plugins to Your Team
Section titled “Adding Plugins to Your Team”Plugin Reference Format
Section titled “Plugin Reference Format”plugin-name@marketplace-nameExamples:
scc-safety-net@sandboxed-code-officialjava-analyzer@internal-toolsreact-devtools@frontend-marketplace
In Your Team Config
Section titled “In Your Team Config”{ "additional_plugins": [ "scc-safety-net@sandboxed-code-official", "java-analyzer@internal-tools", "spring-boot-helper@internal-tools" ]}Essential Plugins
Section titled “Essential Plugins”scc-safety-net
Section titled “scc-safety-net”The most important plugin. Blocks destructive git commands:
| Blocked Command | Why |
|---|---|
git push --force | Overwrites remote history |
git reset --hard | Discards uncommitted changes |
git branch -D | Force-deletes branches |
git clean -fd | Deletes untracked files |
git checkout/restore | Can overwrite local changes |
Enable in your config:
"additional_plugins": [ "scc-safety-net@sandboxed-code-official"]Plugin Governance
Section titled “Plugin Governance”What Gets Blocked
Section titled “What Gets Blocked”Organization admins can block plugins by pattern:
{ "security": { "blocked_plugins": [ "*experimental*", "*beta*", "untrusted-*" ] }}Even if you add these to your team config, they will be filtered out.
What You Can Add
Section titled “What You Can Add”Your additions must:
- Come from an approved marketplace
- Not match any
blocked_pluginspattern - Match
allowed_pluginspattern (if org specifies one)
Allowing Developer Additions
Section titled “Allowing Developer Additions”You can let developers add project-specific plugins:
{ "delegation": { "allow_additional_plugins": ["team-*", "project-*"] }}This lets developers add plugins matching those patterns in their .scc.yaml.
Restrictive Approach
Section titled “Restrictive Approach”{ "delegation": { "allow_additional_plugins": [] }}Developers cannot add any plugins beyond team defaults.
Permissive Approach
Section titled “Permissive Approach”{ "delegation": { "allow_additional_plugins": ["*"] }}Developers can add any non-blocked plugin from approved marketplaces.
Auditing Plugins
Section titled “Auditing Plugins”See what plugins are currently installed:
scc audit pluginsOutput:
Team: backendEffective plugins: ✓ scc-safety-net@sandboxed-code-official (from: team) ✓ java-analyzer@internal (from: team) ✓ project-linter@internal (from: project/.scc.yaml)
Blocked plugins (attempted but filtered): ✗ experimental-tool@internal (matches: *experimental*)Troubleshooting
Section titled “Troubleshooting”Plugin not appearing
Section titled “Plugin not appearing”-
Check it’s in an approved marketplace
Terminal window scc config explain --field marketplaces -
Check it’s not blocked
Terminal window scc config explain --field blocked_plugins -
Check spelling of plugin and marketplace names
-
Force refresh config
Terminal window scc update --force
Plugin blocked unexpectedly
Section titled “Plugin blocked unexpectedly”The plugin matches a blocked_plugins pattern. Contact your org admin if you believe this is incorrect.
Different plugins on different machines
Section titled “Different plugins on different machines”Ensure everyone has the latest config:
scc updateCheck effective config:
scc config explain --field plugins