security-bluebook-builder

Build security Blue Books for sensitive apps

23 stars

Best use case

security-bluebook-builder is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

Build security Blue Books for sensitive apps

Teams using security-bluebook-builder should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/security-bluebook-builder/SKILL.md --create-dirs "https://raw.githubusercontent.com/christophacham/agent-skills-library/main/skills/security/security-bluebook-builder/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/security-bluebook-builder/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How security-bluebook-builder Compares

Feature / Agentsecurity-bluebook-builderStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Build security Blue Books for sensitive apps

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

SKILL.md Source

# Security Bluebook Builder

## Overview

Build security Blue Books for sensitive apps

## When to Use This Skill

Use this skill when you need to work with build security blue books for sensitive apps.

## Instructions

This skill provides guidance and patterns for build security blue books for sensitive apps.

For more information, see the [source repository](https://github.com/SHADOWPR0/security-bluebook-builder).

Related Skills

web-security-testing

23
from christophacham/agent-skills-library

Web application security testing workflow for OWASP Top 10 vulnerabilities including injection, XSS, authentication flaws, and access control issues.

solidity-security

23
from christophacham/agent-skills-library

Master smart contract security best practices to prevent common vulnerabilities and implement secure Solidity patterns. Use when writing smart contracts, auditing existing contracts, or implementin...

seo-authority-builder

23
from christophacham/agent-skills-library

Analyzes content for E-E-A-T signals and suggests improvements to build authority and trust. Identifies missing credibility elements. Use PROACTIVELY for YMYL topics.

securitytrails-automation

23
from christophacham/agent-skills-library

Automate Securitytrails tasks via Rube MCP (Composio). Always search tools first for current schemas.

security-threat-model

23
from christophacham/agent-skills-library

Repository-grounded threat modeling that enumerates trust boundaries, assets, attacker capabilities, abuse paths, and mitigations, and writes a concise Markdown threat model. Use when the user asks to threat model a codebase or path, enumerate threats or abuse paths, or perform AppSec threat modeling. Do NOT use for general architecture summaries, code review, security best practices (use security-best-practices), or non-security design work.

security-scanning-security-sast

23
from christophacham/agent-skills-library

Static Application Security Testing (SAST) for code vulnerability analysis across multiple languages and frameworks

security-scanning-security-hardening

23
from christophacham/agent-skills-library

Coordinate multi-layer security scanning and hardening across application, infrastructure, and compliance controls.

security-scanning-security-dependencies

23
from christophacham/agent-skills-library

You are a security expert specializing in dependency vulnerability analysis, SBOM generation, and supply chain security. Scan project dependencies across ecosystems to identify vulnerabilities, ass...

security-requirement-extraction

23
from christophacham/agent-skills-library

Derive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.

security-ownership-map

23
from christophacham/agent-skills-library

Analyze git repositories to build a security ownership topology (people-to-file), compute bus factor and sensitive-code ownership, and export CSV/JSON for graph databases and visualization. Use when the user explicitly wants a security-oriented ownership or bus-factor analysis grounded in git history (for example: orphaned sensitive code, security maintainers, CODEOWNERS reality checks for risk, sensitive hotspots, or ownership clusters). Do NOT use for general maintainer lists, non-security ownership questions, or threat modeling (use security-threat-model).

security-compliance-compliance-check

23
from christophacham/agent-skills-library

You are a compliance expert specializing in regulatory requirements for software systems including GDPR, HIPAA, SOC2, PCI-DSS, and other industry standards. Perform compliance audits and provide im...

security-best-practices

23
from christophacham/agent-skills-library

Perform language and framework specific security best-practice reviews and suggest improvements. Use when the user explicitly requests security best practices guidance, a security review or report, or secure-by-default coding help. Supports Python, JavaScript/TypeScript, and Go. Do NOT use for general code review, debugging, threat modeling (use security-threat-model), or non-security tasks.