Agent skill
mcaf-security-baseline
Apply baseline engineering security guidance: secrets handling, secure defaults, threat modelling references, and review checkpoints for auth, data flow, pipelines, and external integrations. Use when a change has security impact but does not require a full standalone AppSec engagement.
Stars
47
Forks
6
Install this agent skill to your Project
npx add-skill https://github.com/managedcode/MCAF/tree/main/skills/mcaf-security-baseline
SKILL.md
MCAF: Security Baseline
Trigger On
- a change has security impact but does not need a full separate AppSec exercise
- the work touches auth, secrets, trust boundaries, data flow, or pipeline permissions
- the team needs secure-default guidance before implementing
Value
- produce a concrete project delta: code, docs, config, tests, CI, or review artifact
- reduce ambiguity through explicit planning, verification, and final validation skills
- leave reusable project context so future tasks are faster and safer
Do Not Use For
- a full standalone threat-modeling engagement
- generic code review with no security surface
Inputs
- the changed boundary, data flow, or integration
- auth, secret, and permission model for the affected path
- current security docs, ADRs, or CI rules
Quick Start
- Read the nearest
AGENTS.mdand confirm scope and constraints. - Run this skill's
Workflowthrough theRalph Loopuntil outcomes are acceptable. - Return the
Required Result Formatwith concrete artifacts and verification evidence.
Workflow
- Identify the security surface:
- authn and authz
- secrets
- external inputs
- storage and transport
- pipeline permissions
- Apply secure defaults and least privilege before adding behaviour.
- If the change introduces a trust boundary, update or add an ADR and link the reasoning.
- Pull the relevant security references, not the whole set.
Deliver
- security-aware design or implementation guidance
- updated security checkpoints in docs, ADRs, or CI
- the right threat-model references for the impacted area
Validate
- secrets are handled explicitly
- authn and authz assumptions are visible
- new trust boundaries are documented
- the change does not smuggle insecure defaults into the repo
Ralph Loop
Use the Ralph Loop for every task, including docs, architecture, testing, and tooling work.
- Brainstorm first (mandatory):
- analyze current state
- define the problem, target outcome, constraints, and risks
- generate options and think through trade-offs before committing
- capture the recommended direction and open questions
- Plan second (mandatory):
- write a detailed execution plan from the chosen direction
- list final validation skills to run at the end, with order and reason
- Execute one planned step and produce a concrete delta.
- Review the result and capture findings with actionable next fixes.
- Apply fixes in small batches and rerun the relevant checks or review steps.
- Update the plan after each iteration.
- Repeat until outcomes are acceptable or only explicit exceptions remain.
- If a dependency is missing, bootstrap it or return
status: not_applicablewith explicit reason and fallback path.
Required Result Format
status:complete|clean|improved|configured|not_applicable|blockedplan: concise plan and current iteration stepactions_taken: concrete changes madevalidation_skills: final skills run, or skipped with reasonsverification: commands, checks, or review evidence summaryremaining: top unresolved items ornone
For setup-only requests with no execution, return status: configured and exact next commands.
Load References
- read
references/security.mdfirst - open
references/rules-of-engagement.mdorreferences/threat-modelling.mdonly when they match the task
Example Requests
- "Review the security baseline for this new OAuth flow."
- "We are adding a webhook. What baseline security work is required?"
- "Tighten secrets and pipeline permissions for this repo."
Didn't find tool you were looking for?