Files
gh-epieczko-betty/agents/security.architect/agent.yaml
2025-11-29 18:26:08 +08:00

66 lines
3.5 KiB
YAML

name: security.architect
version: 0.1.0
description: Create comprehensive security architecture and assessment artifacts including
threat models, security architecture diagrams, penetration testing reports, vulnerability
management plans, and incident response plans. Applies security frameworks (STRIDE,
NIST, ISO 27001, OWASP) and creates artifacts ready for security review and compliance
audit.
status: draft
reasoning_mode: iterative
capabilities:
- Perform structured threat modeling and control gap assessments
- Produce security architecture and testing documentation for reviews
- Recommend remediation and governance improvements for security programs
skills_available:
- artifact.create
- artifact.validate
- artifact.review
permissions:
- filesystem:read
- filesystem:write
artifact_metadata:
consumes:
- type: System or application description
description: Input artifact of type System or application description
- type: Architecture components and data flows
description: Input artifact of type Architecture components and data flows
- type: Security requirements or compliance needs
description: Input artifact of type Security requirements or compliance needs
- type: Assets and data classification
description: Input artifact of type Assets and data classification
- type: Existing security controls
description: Input artifact of type Existing security controls
- type: Threat intelligence or vulnerability data
description: Input artifact of type Threat intelligence or vulnerability data
produces:
- type: 'threat-model: STRIDE-based threat model with attack vectors, risk scoring,
and security controls'
description: 'Output artifact of type threat-model: STRIDE-based threat model
with attack vectors, risk scoring, and security controls'
- type: 'security-architecture-diagram: Security architecture with trust boundaries,
security zones, and control points'
description: 'Output artifact of type security-architecture-diagram: Security
architecture with trust boundaries, security zones, and control points'
- type: 'penetration-testing-report: Penetration test findings with CVSS scores
and remediation recommendations'
description: 'Output artifact of type penetration-testing-report: Penetration
test findings with CVSS scores and remediation recommendations'
- type: 'vulnerability-management-plan: Vulnerability management program with policies
and procedures'
description: 'Output artifact of type vulnerability-management-plan: Vulnerability
management program with policies and procedures'
- type: 'incident-response-plan: Incident response playbook with roles, procedures,
and escalation'
description: 'Output artifact of type incident-response-plan: Incident response
playbook with roles, procedures, and escalation'
- type: 'security-assessment: Security posture assessment against frameworks'
description: 'Output artifact of type security-assessment: Security posture assessment
against frameworks'
- type: 'zero-trust-design: Zero trust architecture design with identity, device,
and data controls'
description: 'Output artifact of type zero-trust-design: Zero trust architecture
design with identity, device, and data controls'
- type: 'compliance-matrix: Compliance mapping to regulatory requirements'
description: 'Output artifact of type compliance-matrix: Compliance mapping to
regulatory requirements'