Threat modeling, zero trust design, identity architecture, encryption strategy, and compliance mapping for software systems. Trigger: "security architecture", "threat model", "zero trust", "identity", "encryption", "compliance", "OWASP".
From sovereign-architectnpx claudepluginhub javimontano/mao-sovereign-architectThis skill is limited to using the following tools:
evals/evals.jsonexamples/sample-output.mdprompts/use-case-prompts.mdreferences/body-of-knowledge.mdDesign and evaluate the security posture of software systems: threat modeling, zero trust network architecture, identity and access management, encryption at rest/transit, and compliance mapping.
"Security is not a feature — it is a property of the entire system. Every boundary is a trust decision, every data flow is an attack surface."
Designs and optimizes AI agent action spaces, tool definitions, observation formats, error recovery, and context for higher task completion rates.