Catalog
affaan-m/hermes-imports

affaan-m

hermes-imports

Convert local Hermes operator workflows into sanitized ECC skills and release-pack artifacts. Use when preparing a Hermes workflow for public ECC reuse without leaking private workspace state, credentials, or local-only paths.

global
0installs0uses~735
v1.0Saved Apr 29, 2026

Hermes Imports

Use this skill when turning a repeated Hermes workflow into something safe to ship in ECC.

Hermes is the operator shell. ECC is the reusable workflow layer. Imports should move stable patterns from Hermes into ECC without moving private state.

When To Use

  • A Hermes workflow has repeated enough times to become reusable.
  • A local operator prompt should become a public ECC skill.
  • A launch, content, research, or engineering workflow needs sanitized handoff docs.
  • A workflow mentions local paths, credentials, personal datasets, or private account names that must be removed before publication.

Import Rules

  • Convert local paths to repo-relative paths or placeholders.
  • Replace live account names with role labels such as operator, default profile, or workspace owner.
  • Describe credential requirements by provider name only.
  • Keep examples narrow and operational.
  • Do not ship raw workspace exports, tokens, OAuth files, health data, CRM data, or finance data.
  • If the workflow requires private state to make sense, keep it local.

Sanitization Checklist

Before committing an imported workflow, scan for:

  • absolute paths such as /Users/...
  • ~/.hermes paths unless the doc is explicitly explaining local setup
  • API keys, tokens, cookies, OAuth files, or bearer strings
  • phone numbers, private email addresses, and personal contact graphs
  • client names, family names, or account names that are not already public
  • revenue, health, or CRM details
  • raw logs that include tool output from private systems

Conversion Pattern

  1. Identify the repeatable operator loop.
  2. Strip private inputs and outputs.
  3. Rewrite local paths as repo-relative examples.
  4. Turn one-off instructions into a When To Use section and a short process.
  5. Add concrete output requirements.
  6. Run a secret and local-path scan before opening a PR.

Example: Launch Handoff

Local Hermes prompt:

Read my local workspace files and finalize launch copy.

ECC-safe version:

Use the public release pack under docs/releases/<version>/.
Return one X thread, one LinkedIn post, one recording checklist, and the missing assets list.

Example: Quiet-Hours Operator Job

Local Hermes job:

Run my private inbox, finance, and content checks overnight.

ECC-safe version:

Describe the scheduler policy, the quiet-hours window, the escalation rules, and the categories of checks. Do not include private data sources or credentials.

Output Contract

Return:

  • candidate ECC skill name
  • sanitized workflow summary
  • required public inputs
  • private inputs removed
  • remaining risks
  • files that should be created or updated
Files1
1 files · 1.0 KB

Select a file to preview

Overall Score

82/100

Grade

B

Good

Safety

92

Quality

82

Clarity

85

Completeness

75

Summary

This skill guides operators in converting private Hermes workflows into sanitized, public-ready ECC skills by removing credentials, personal data, and local paths. It provides a structured sanitization checklist and conversion pattern to ensure sensitive information is stripped before publishing workflows as reusable components.

Detected Capabilities

Workflow analysis and pattern extractionSensitive data identification (paths, credentials, personal identifiers)Path normalization (local to repo-relative)Credential redaction (provider-name substitution)Output contract definitionPre-commit security scanning guidance

Trigger Keywords

Phrases that MCP clients use to match this skill to user intent.

sanitize hermes workflowpublish operator skillremove credentials from workflowhermes to ecc conversionprepare workflow for reuse

Risk Signals

INFO

Skill teaches how to identify and remove sensitive data (credentials, paths, personal info) from workflows

Sanitization Checklist section
INFO

Explicit guidance to NOT ship tokens, OAuth files, health data, CRM data, finance data, or raw logs from private systems

Import Rules and Sanitization Checklist sections
INFO

No shell commands, file writes, or destructive operations — skill is guidance-only for human review

Entire skill body

Use Cases

  • Convert a repeated internal workflow into a reusable public skill
  • Prepare a private operator prompt for ECC publication
  • Sanitize launch, content, research, or engineering workflows for team sharing
  • Review a workflow for sensitive data leakage before opening a PR
  • Transform local-only instructions into role-based, generalizable processes

Quality Notes

  • Clear, well-structured guidance with explicit 'When To Use' section that prevents misuse
  • Comprehensive sanitization checklist covers common credential and PII patterns (absolute paths, API keys, phone numbers, account names, health/CRM data)
  • Two practical examples (Launch Handoff, Quiet-Hours Operator Job) demonstrate the conversion pattern in context
  • Output contract is explicit — agent knows exactly what artifacts should be produced
  • Strong emphasis on security guardrails: 'If the workflow requires private state to make sense, keep it local' prevents over-sharing
  • Conversion pattern is concrete and sequential (5 clear steps), making it actionable
  • Licensed under MIT with clear copyright attribution
  • Skill does NOT perform automated redaction — it guides human review, which is the correct approach for sensitive data
Model: claude-haiku-4-5-20251001Analyzed: Apr 29, 2026

Reviews

Add this skill to your library to leave a review.

No reviews yet

Be the first to share your experience.

Add affaan-m/hermes-imports to your library

Command Palette

Search for a command to run...