Files
gh-tachyon-beep-skillpacks-…/plugin.lock.json
2025-11-30 08:59:46 +08:00

77 lines
2.9 KiB
JSON

{
"$schema": "internal://schemas/plugin.lock.v1.json",
"pluginId": "gh:tachyon-beep/skillpacks:plugins/ordis-security-architect",
"normalized": {
"repo": null,
"ref": "refs/tags/v20251128.0",
"commit": "2b527ed26da43532f4fad648befa2e8f60611800",
"treeHash": "7d110866bbf87f7ea40dd0982cb8a2873b537e6a29de50d70b194e8b39034aed",
"generatedAt": "2025-11-28T10:28:33.210892Z",
"toolVersion": "publish_plugins.py@0.2.0"
},
"origin": {
"remote": "git@github.com:zhongweili/42plugin-data.git",
"branch": "master",
"commit": "aa1497ed0949fd50e99e70d6324a29c5b34f9390",
"repoRoot": "/Users/zhongweili/projects/openmind/42plugin-data"
},
"manifest": {
"name": "ordis-security-architect",
"description": "Threat modeling, security controls, compliance, ATO - 9 comprehensive security skills",
"version": "1.0.1"
},
"content": {
"files": [
{
"path": "README.md",
"sha256": "86b9b43aa7dac0fe85780250127ccac0cb0412481b9f2bf94b02ccd22dd7fc0f"
},
{
"path": ".claude-plugin/plugin.json",
"sha256": "85abc799c8768a6111a95741f765c617d8665885ce18a0e79877d3a714fb5ac4"
},
{
"path": "skills/using-security-architect/security-architecture-review.md",
"sha256": "3a88ebda527725c71638289683dc8065e30455c43a9b5d2346efd87bdd03fa91"
},
{
"path": "skills/using-security-architect/threat-modeling.md",
"sha256": "ccb8aafbc6ba19ffbbc49eaaccce2f2d7965ebc116b1042bf77c30b39bd1a3cb"
},
{
"path": "skills/using-security-architect/security-controls-design.md",
"sha256": "3d92f1e4504df0af9413049e61ed23c02ce36324b377eb826f7902160f1a0fab"
},
{
"path": "skills/using-security-architect/security-authorization-and-accreditation.md",
"sha256": "f2976a1c9e809e57176e6faa8e6d05dd0df599feed7592c8ff39c4d9da71ef77"
},
{
"path": "skills/using-security-architect/classified-systems-security.md",
"sha256": "573fc1ebf064fea1d773084d5a856a38f2d2a2f75e30e283714ff58417f825f9"
},
{
"path": "skills/using-security-architect/compliance-awareness-and-mapping.md",
"sha256": "3f518d89a072b55ab42019c856131b247657149f037779f1ddb1fbf572b2e5ed"
},
{
"path": "skills/using-security-architect/secure-by-design-patterns.md",
"sha256": "fef561acb61e5dad99b31ebef436786a728c74732d93d0505cd5c60e31117a42"
},
{
"path": "skills/using-security-architect/SKILL.md",
"sha256": "289523c06f2ecf5ee0cb34a9a4505217a652a4589c750129c7c70c9f1038e9d9"
},
{
"path": "skills/using-security-architect/documenting-threats-and-controls.md",
"sha256": "f408f1bc3af45d77c1ce8151046593eee6f93fcda611ffda6ad274048d676154"
}
],
"dirSha256": "7d110866bbf87f7ea40dd0982cb8a2873b537e6a29de50d70b194e8b39034aed"
},
"security": {
"scannedAt": null,
"scannerVersion": null,
"flags": []
}
}