custom-agent-definitions

Custom Agent Definitions

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "custom-agent-definitions" with this command: npx skills add laurigates/claude-plugins/laurigates-claude-plugins-custom-agent-definitions

Custom Agent Definitions

Expert knowledge for defining and configuring custom agents in Claude Code.

Core Concepts

Custom Agents allow you to define specialized agent types beyond the built-in ones (Explore, Plan, Bash, etc.). Each custom agent can have its own model, tools, and context configuration.

Agent Definition Schema

Custom agents are defined in .claude/agents/ or via plugin agent directories.

Basic Structure


name: my-custom-agent description: What this agent does model: sonnet allowed-tools: Bash, Read, Grep, Glob

Agent System Prompt

Instructions and context for the agent...

Context Forking

The context field controls how the agent's context relates to the parent conversation:

Value Behavior

fork

Creates an independent context copy - agent sees parent history but changes don't affect parent

(default) Agent shares context with parent and can see/modify conversation state

Example: Isolated Research Agent


name: research-agent description: Research questions without modifying main context model: sonnet context: fork allowed-tools: WebSearch, WebFetch, Read

Research Agent

You are a research specialist. Search for information and provide findings. Your research doesn't affect the main conversation context.

When to use context: fork :

  • Exploratory research that shouldn't pollute main context

  • Parallel investigations with potentially conflicting approaches

  • Isolated experiments or testing

  • Background tasks that run independently

Agent Field for Delegation

The agent field specifies which agent type to use when delegating via the Agent tool:


name: code-review-workflow description: Comprehensive code review agent: security-auditor allowed-tools: Read, Grep, Glob, TodoWrite

This allows commands and skills to specify a preferred agent type for delegation.

Disallowed Tools (Restrictions)

The disallowedTools field explicitly prevents an agent from using certain tools:


name: read-only-explorer description: Explore codebase without modifications model: haiku allowed-tools: Bash, Read, Grep, Glob disallowedTools: Write, Edit, NotebookEdit

Read-Only Explorer

Explore and analyze code. Do not make any modifications.

Disallowed Tools vs Allowed Tools:

Field Purpose Behavior

allowed-tools

Whitelist of permitted tools Agent can ONLY use these tools

disallowedTools

Blacklist of forbidden tools Agent can use all tools EXCEPT these

When to use disallowedTools :

  • Creating read-only agents that can explore but not modify

  • Restricting dangerous capabilities (Bash execution)

  • Sandboxing agents for specific tasks

  • Security-sensitive contexts

Complete Example


name: security-auditor description: Security-focused code review agent model: sonnet context: fork allowed-tools: Read, Grep, Glob, WebSearch, TodoWrite disallowedTools: Bash, Write, Edit created: 2026-01-20 modified: 2026-01-20 reviewed: 2026-01-20

Security Auditor Agent

You are a security auditor. Analyze code for vulnerabilities.

Capabilities

  • Read and analyze source code
  • Search for security patterns
  • Research known vulnerabilities
  • Track findings in todo list

Restrictions

  • Cannot execute code (no Bash)
  • Cannot modify files (no Write/Edit)
  • Work in isolated context

Focus Areas

  1. SQL injection vulnerabilities
  2. XSS vulnerabilities
  3. Authentication/authorization flaws
  4. Secrets/credentials in code
  5. Insecure dependencies

Defining Agents in Plugins

Plugins can define custom agents in their agents/ directory:

my-plugin/ ├── .claude-plugin/ │ └── plugin.json ├── agents/ │ ├── security-auditor.md │ ├── performance-analyzer.md │ └── accessibility-checker.md └── skills/ └── ...

Each agent file follows the same YAML frontmatter + markdown body structure.

Using Custom Agents

Via Task Tool

Agent tool with subagent_type="security-auditor" for security analysis.

Via Delegation

/delegate Audit auth module for security issues

The delegation system matches tasks to appropriate custom agents.

Best Practices

  1. Principle of Least Privilege

Only grant tools the agent actually needs:

Good: Minimal tools for the task

allowed-tools: Read, Grep, Glob

Avoid: Overly permissive

allowed-tools: Bash, Read, Write, Edit, Grep, Glob, WebSearch, WebFetch

  1. Use Context Forking for Isolation

Good: Isolated exploratory work

context: fork

  1. Combine Allowed and Disallowed

Explicit whitelist with safety blacklist

allowed-tools: Bash, Read, Grep disallowedTools: Write, Edit

  1. Clear Agent Descriptions

description: | Security auditor for identifying vulnerabilities in authentication and authorization code. Reports findings without modifying code.

  1. Model Selection

Use Case Model Model ID

Simple/mechanical tasks haiku claude-haiku-4-5

Development workflows sonnet claude-sonnet-4-6

Deep reasoning/analysis opus claude-opus-4-6

Agent Configuration Fields Reference

Field Type Description

name

string Agent identifier

description

string What the agent does

model

string Model to use (haiku, sonnet, opus)

context

string Context mode: fork or default

permissionMode

string default , acceptEdits , dontAsk , bypassPermissions , or plan

maxTurns

number Maximum agentic turns before agent stops

background

bool Set true to always run as a background task

memory

string Persistent memory scope: user , project , or local

skills

list Skill names to preload into agent context at startup

mcpServers

list MCP server names available to this agent

tools

list Tools the agent can use (in agents/ dir; use allowed-tools in skills)

disallowedTools

list Tools the agent cannot use

created

date Creation date

modified

date Last modification date

reviewed

date Last review date

Common Patterns

Read-Only Research Agent

context: fork allowed-tools: Read, Grep, Glob, WebSearch, WebFetch disallowedTools: Bash, Write, Edit

Safe Code Executor

allowed-tools: Bash, Read disallowedTools: Write, Edit

Documentation Writer

allowed-tools: Read, Write, Edit, Grep, Glob disallowedTools: Bash

Full-Power Developer

allowed-tools: Bash, Read, Write, Edit, Grep, Glob, TodoWrite

Agentic Optimizations

Context Configuration

Exploratory research context: fork , model: haiku

Security analysis context: fork , disallowedTools: Bash, Write, Edit

Quick lookups model: haiku , minimal tools

Complex implementation model: sonnet , full tools

Quick Reference

Context Modes

Mode Isolation Use Case

(default) Shared Normal workflows

fork

Isolated Research, experiments

Tool Restriction Patterns

Pattern Fields

Whitelist only allowed-tools: Tool1, Tool2

Blacklist only disallowedTools: Tool1, Tool2

Combined Both fields specified

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Web3

langchain-init

No summary provided by upstream source.

Repository SourceNeeds Review
Web3

langchain development

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

python-code-quality

No summary provided by upstream source.

Repository SourceNeeds Review
General

ruff linting

No summary provided by upstream source.

Repository SourceNeeds Review