Implement FireCrawl lint rules, policy enforcement, and automated guardrails. Use when setting up code quality rules for FireCrawl integrations, implementing pre-commit hooks, or configuring CI policy checks for FireCrawl best practices. Trigger with phrases like "firecrawl policy", "firecrawl lint", "firecrawl guardrails", "firecrawl best practices check", "firecrawl eslint".
View on GitHubjeremylongshore/claude-code-plugins-plus-skills
firecrawl-pack
plugins/saas-packs/firecrawl-pack/skills/firecrawl-policy-guardrails/SKILL.md
February 1, 2026
Select agents to install to:
npx add-skill https://github.com/jeremylongshore/claude-code-plugins-plus-skills/blob/main/plugins/saas-packs/firecrawl-pack/skills/firecrawl-policy-guardrails/SKILL.md -a claude-code --skill firecrawl-policy-guardrailsInstallation paths:
.claude/skills/firecrawl-policy-guardrails/# FireCrawl Policy & Guardrails
## Overview
Automated policy enforcement and guardrails for FireCrawl integrations.
## Prerequisites
- ESLint configured in project
- Pre-commit hooks infrastructure
- CI/CD pipeline with policy checks
- TypeScript for type enforcement
## ESLint Rules
### Custom FireCrawl Plugin
```javascript
// eslint-plugin-firecrawl/rules/no-hardcoded-keys.js
module.exports = {
meta: {
type: 'problem',
docs: {
description: 'Disallow hardcoded FireCrawl API keys',
},
fixable: 'code',
},
create(context) {
return {
Literal(node) {
if (typeof node.value === 'string') {
if (node.value.match(/^sk_(live|test)_[a-zA-Z0-9]{24,}/)) {
context.report({
node,
message: 'Hardcoded FireCrawl API key detected',
});
}
}
},
};
},
};
```
### ESLint Configuration
```javascript
// .eslintrc.js
module.exports = {
plugins: ['firecrawl'],
rules: {
'firecrawl/no-hardcoded-keys': 'error',
'firecrawl/require-error-handling': 'warn',
'firecrawl/use-typed-client': 'warn',
},
};
```
## Pre-Commit Hooks
```yaml
# .pre-commit-config.yaml
repos:
- repo: local
hooks:
- id: firecrawl-secrets-check
name: Check for FireCrawl secrets
entry: bash -c 'git diff --cached --name-only | xargs grep -l "sk_live_" && exit 1 || exit 0'
language: system
pass_filenames: false
- id: firecrawl-config-validate
name: Validate FireCrawl configuration
entry: node scripts/validate-firecrawl-config.js
language: node
files: '\.firecrawl\.json$'
```
## TypeScript Strict Patterns
```typescript
// Enforce typed configuration
interface FireCrawlStrictConfig {
apiKey: string; // Required
environment: 'development' | 'staging' | 'production'; // Enum
timeout: number; // Required number, not optional
retries: number;
}
// Disallow any in FireCrawl code
// @ts