By kaademos
Embed a team of 8 AI security agents in your coding workflow to automate Secure SDLC across all phases: elicit security requirements, generate STRIDE threat models, review PRs and code for OWASP/ASVS, scan IaC for misconfigs, map compliance to NIST/SOC2/GDPR, triage vulns, and gate releases with go/no-go decisions. Works in Claude Code, Cursor, Windsurf, or any MCP tool.
npx claudepluginhub kaademos/secure-sdlc-agents --plugin secure-sdlc-agentsSecure Product Manager. Elicits and documents security requirements by mapping user stories and acceptance criteria to OWASP ASVS controls. Engages stakeholders to surface implicit security expectations. Should be invoked at the start of every feature or sprint to produce a security requirements document before design begins. Use this agent when: - Starting a new feature, epic, or project - Revising requirements after a threat model identifies new risks - Reviewing a backlog for missing security acceptance criteria - Translating compliance obligations (SOC 2, GDPR, PCI) into developer-ready stories
Application Security Engineer. Performs threat modelling, reviews code for security vulnerabilities, triages SAST/DAST findings, coordinates penetration testing, and provides remediation guidance. This is the primary security SME throughout the SDLC. Use this agent when: - A new architecture or significant feature requires a threat model - SAST findings need triage and developer-friendly remediation guidance - DAST or pentest results need to be interpreted and prioritised - A security-sensitive code component (auth, crypto, access control) needs expert review - An incident or vulnerability report requires root-cause analysis
Governance, Risk and Compliance Analyst. Maintains the risk register, maps security controls to compliance frameworks, collects audit evidence, and produces compliance attestations. Participates at the Plan, Design, Test and Release phases. Use this agent when: - A new project requires a compliance framework mapping - A risk needs to be formally accepted, transferred, or mitigated - Audit evidence needs to be collected for a control - A compliance gap analysis is required - Producing a final compliance attestation for release
Cloud and Platform Security Engineer. Reviews infrastructure-as-code for misconfigurations, enforces secrets management practices, performs CSPM-style checks, validates runtime hardening, and ensures the deployment pipeline is secure. Use this agent when: - Reviewing Terraform, Pulumi, CloudFormation, Helm, or Kubernetes manifests - Checking for exposed or hardcoded secrets in code or config - Validating CI/CD pipeline security (supply chain, build integrity) - Reviewing container images and base image choices - Confirming production environment hardening before release - Assessing network segmentation, IAM policies, and service mesh configuration
Secure Development Lead. Enforces secure coding standards, reviews pull requests for security issues, manages software composition analysis (SCA / dependency review), and implements fixes for vulnerabilities identified by AppSec. The bridge between security findings and developer-ready solutions. Use this agent when: - Reviewing a pull request or code diff for security issues - Checking dependencies for known CVEs or suspicious packages - Implementing a remediation for a vulnerability flagged by appsec-engineer - Establishing or enforcing secure coding standards for a language/framework - Running security regression tests after a fix
Security-focused Release Manager. Executes the pre-release security checklist, aggregates sign-offs from all other agents, and issues a formal go/no-go decision. The final gate before any code reaches production. Use this agent when: - A release candidate is ready and requires a security sign-off - Running a pre-release security checklist - Coordinating the resolution of last-minute security findings - Producing the release security sign-off document - Rolling back a release due to a security incident
Security Champion — a developer-level security advocate embedded in the squad. Provides first-line security guidance, answers quick security questions, reviews small changes informally, and coaches developers on secure patterns. Lower friction than a full appsec review; higher throughput for day-to-day questions. Use this agent when: - A developer has a quick security question ("Is this pattern safe?", "Which library should I use?") - Reviewing a small code change that doesn't warrant a full appsec review - Teaching developers why a pattern is insecure and what to use instead - Unblocking a developer who has a MEDIUM or LOW finding they need guidance on - Performing a first-pass review before escalating to appsec-engineer - Running a squad security standup or retrospective on security debt
AI/LLM Security Engineer. Specialist in the security risks unique to AI and LLM-powered features: prompt injection, indirect prompt injection, model poisoning, agentic trust boundaries, AI supply chain, output validation, and PII leakage to external model APIs. References OWASP Top 10 for LLMs 2025 and emerging 2026 guidance. Use this agent when: - Building any feature that calls an LLM API (OpenAI, Anthropic, Google, etc.) - Designing an AI agent that can call tools or functions - Processing user-supplied input that will be sent to a model - Using RAG (Retrieval Augmented Generation) with external data sources - Building a system where AI output influences security decisions or code execution - Evaluating model selection for security and privacy implications - Assessing AI supply chain risk (fine-tuned models, LoRA adapters, third-party embeddings)
Use when building any feature that calls an LLM API, processes user input sent to a model, uses RAG or embeddings, deploys an AI agent with tool access, or makes AI-generated output visible to users or downstream systems.
Use when a project requires a compliance framework mapping, when risks need formal documentation, when audit evidence must be collected, or when producing a compliance attestation before release. Applies to SOC 2, ISO 27001, GDPR, PCI DSS, NIST CSF, and DORA.
Use when writing or reviewing code that handles user input, authentication, access control, cryptography, error handling, file uploads, or dependency management. Also activates when a pull request touches any security-sensitive component.
Use when a new feature, architecture, or significant design decision is being made. Run before any code is written. Produces a structured STRIDE threat model and architecture review that feeds directly into security requirements and PR review.
Uses power tools
Uses Bash, Write, or Edit tools
Share bugs, ideas, or general feedback.
Own this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claimOwn this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claimSecurity agents — security, compliance, privacy specialists
Secure coding, OWASP guidance, input validation, cryptography, authentication, and secrets management for secure application development.
Agents specialized in security engineering and threat mitigation. Focuses on secure architecture, vulnerability assessment, and compliance.
Stage-aware security guidance for planning, risky implementation changes, review, and release checkpoints.
Security code review skill based on Project CodeGuard's comprehensive security rules. Helps AI coding agents write secure code and prevent common vulnerabilities.
Security skills for vibe coding — pre-coding security assessment, code vulnerability review, and threat modeling. Works without any MCP server or Jira/Confluence setup.
8 AI security specialists. Invoked at the exact phase where each vulnerability would have been caught.
Requirements → threat modelling → code review → IaC → compliance → release gate.
Works in Claude Code, Cursor, Windsurf, Warp, and any MCP-compatible tool.
You asked Claude Code to build a file upload feature. It wrote working code in 4 minutes.
It missed:
| Vulnerability | Severity | Which agent catches it |
|---|---|---|
SVG file with embedded <script> stored and served without sanitisation | CRITICAL | appsec-engineer — MIME type validation, output encoding |
| No file size limit or type allowlist | HIGH | appsec-engineer — input validation, magic byte checks |
S3 bucket provisioned with public-read ACL | CRITICAL | cloud-platform-engineer — IaC security review |
| No rate limiting on the upload endpoint | HIGH | appsec-engineer — anti-automation controls |
| Upload URL in API response leaks internal bucket path | MEDIUM | dev-lead — information disclosure review |
Every one of these has appeared in real breach post-mortems. AI agents optimise for working code, not secure code. This project embeds the specialists that close that gap — at the exact phase where each issue would have been caught.
| What | Why it matters |
|---|---|
| 8 specialist agents | AppSec, Product Manager, GRC Analyst, Cloud/Platform, Dev Lead, Release Manager, Security Champion, AI Security Engineer |
| MCP server | Works in Cursor, Windsurf, Zed, Continue, and any MCP-compatible tool |
CLI tool (secure-sdlc) | Zero-friction setup, kickoff wizard, status dashboard, release gate |
| Cursor rules | Automatic security context in every Cursor session |
| GitHub Actions workflow | Artefact gate, secret scan, SAST (CodeQL), IaC scan (Checkov), dependency audit |
| Git hooks | Pre-commit secret detection, security anti-pattern checks |
| Warp workflows | Pre-built Warp automation for every SDLC phase |
| Stack profiles | Deep, framework-specific guidance for Next.js, FastAPI, Django, Express, Rails |
| Document templates | 8 fully structured templates for every phase artefact |
| Worked examples | 3 complete feature walkthroughs (auth, REST API, file upload) |
| Agent | Role | When to invoke |
|---|---|---|
product-manager | ASVS-mapped security requirements | Start of every feature |
appsec-engineer | Threat modelling, SAST/DAST, vuln triage | Design, Build, Test |
grc-analyst | Compliance mapping, risk register, audit evidence | Plan through Release |
cloud-platform-engineer | IaC security, CSPM, secrets, hardening | Design, Build, Release |
dev-lead | Secure coding, PR review, SCA | Every PR |
release-manager | Security sign-off, go/no-go gate | Pre-release |
security-champion | First-line security Q&A and lightweight review | Any time, any phase |
ai-security-engineer | Prompt injection, agentic risks, LLM supply chain | Any feature using AI/LLMs |
What are you working on?
│
├── Starting a new feature?
│ ├── product-manager → "Define security requirements for X using ASVS L2"
│ └── grc-analyst → "Initialise risk register, map to SOC2 / GDPR / PCI-DSS"
│
├── Designing the architecture?
│ ├── appsec-engineer → "Threat model this design using STRIDE"
│ ├── cloud-platform-engineer → "Review IaC for this feature"
│ └── ai-security-engineer → "Security review — feature calls an LLM" ← always include this
│
├── Writing or merging code?
│ ├── dev-lead → "Review PR #N for secure coding issues and dependency risks"
│ └── appsec-engineer → "Triage SAST findings for PR #N"
│
├── Quick security question (any phase)?
│ └── security-champion → "Is this pattern / library safe? Context: ..."
│
└── Ready to ship?
└── release-manager → "Run pre-release security checklist for vX.Y.Z"
/plugin marketplace add Kaademos/secure-sdlc-agents
/plugin install secure-sdlc-agents@secure-sdlc-agents