eng-team

Secure engineering team skill providing methodology guidance for building security-hardened software. Invoked when users request system design, implementation, code review, testing, CI/CD security, or incident response with security considerations. Routes to 10 specialized agents covering architecture through post-deployment. Integrates NIST SSDF governance, Microsoft SDL phases, OWASP ASVS verification, SLSA supply chain integrity, and DevSecOps automation patterns.

16 stars

Best use case

eng-team is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

Secure engineering team skill providing methodology guidance for building security-hardened software. Invoked when users request system design, implementation, code review, testing, CI/CD security, or incident response with security considerations. Routes to 10 specialized agents covering architecture through post-deployment. Integrates NIST SSDF governance, Microsoft SDL phases, OWASP ASVS verification, SLSA supply chain integrity, and DevSecOps automation patterns.

Teams using eng-team should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/eng-team/SKILL.md --create-dirs "https://raw.githubusercontent.com/geekatron/jerry/main/skills/eng-team/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/eng-team/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How eng-team Compares

Feature / Agenteng-teamStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Secure engineering team skill providing methodology guidance for building security-hardened software. Invoked when users request system design, implementation, code review, testing, CI/CD security, or incident response with security considerations. Routes to 10 specialized agents covering architecture through post-deployment. Integrates NIST SSDF governance, Microsoft SDL phases, OWASP ASVS verification, SLSA supply chain integrity, and DevSecOps automation patterns.

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

Related Guides

SKILL.md Source

# Eng-Team Skill

> **Version:** 1.0.0
> **Framework:** Jerry Eng-Team
> **Constitutional Compliance:** Jerry Constitution v1.0
> **SSOT References:** ADR-PROJ010-001 (Agent Team Architecture), ADR-PROJ010-002 (Skill Routing & Invocation), ADR-PROJ010-003 (LLM Portability)
> **Project:** PROJ-010 Cyber Ops | EPIC-003 (/eng-team Skill Build) | FEAT-020 through FEAT-025

## Document Sections

| Section | Purpose |
|---------|---------|
| [Document Audience](#document-audience-triple-lens) | Triple-Lens audience guide |
| [Purpose](#purpose) | Skill overview and key capabilities |
| [When to Use This Skill](#when-to-use-this-skill) | Activation triggers |
| [Available Agents](#available-agents) | 10-agent roster with roles and output locations |
| [Invoking an Agent](#invoking-an-agent) | Three invocation methods with examples |
| [Orchestration Flow](#orchestration-flow) | 8-step sequential phase-gate workflow |
| [State Passing Between Agents](#state-passing-between-agents) | Output keys and handoff data |
| [Mandatory Persistence](#mandatory-persistence-p-002) | P-002 file persistence requirements |
| [Layered SDLC Governance](#layered-sdlc-governance) | 5-layer governance model (AD-008) |
| [Adversarial Quality Mode](#adversarial-quality-mode) | /adversary integration and criticality escalation |
| [Constitutional Compliance](#constitutional-compliance) | Governing principles |
| [Quick Reference](#quick-reference) | Common workflows and agent selection hints |
| [Agent Details](#agent-details) | Agent file paths |
| [Routing Disambiguation](#routing-disambiguation) | When this skill is the wrong choice |
| [References and Traceability](#references-and-traceability) | ADR baseline, architecture decisions, research provenance |

## Document Audience (Triple-Lens)

This SKILL.md serves multiple audiences:

| Level | Audience | Sections to Focus On |
|-------|----------|---------------------|
| **L0 (ELI5)** | New users, stakeholders | [Purpose](#purpose), [When to Use This Skill](#when-to-use-this-skill), [Quick Reference](#quick-reference) |
| **L1 (Engineer)** | Developers invoking agents | [Invoking an Agent](#invoking-an-agent), [Agent Details](#agent-details), [Adversarial Quality Mode](#adversarial-quality-mode) |
| **L2 (Architect)** | Workflow designers | [Orchestration Flow](#orchestration-flow), [State Passing Between Agents](#state-passing-between-agents), [Layered SDLC Governance](#layered-sdlc-governance) |

---

## Purpose

The Eng-Team skill provides a structured secure software engineering framework through 10 specialized agents. Each agent produces **persistent artifacts** that survive context compaction, enforce security standards at every phase, and build a cumulative knowledge base of security-hardened engineering decisions.

### Key Capabilities

- **Secure Architecture** -- System design with threat modeling (STRIDE/DREAD/PASTA) and architecture decision records
- **Implementation Planning** -- Standards enforcement, dependency governance, and SAMM maturity assessment
- **Secure Backend Engineering** -- Server-side implementation with OWASP Top 10 and ASVS verification
- **Secure Frontend Engineering** -- Client-side implementation with XSS prevention, CSP, and CORS hardening
- **Secure Infrastructure** -- IaC security, container hardening, SBOM generation, and SLSA supply chain integrity
- **DevSecOps Automation** -- SAST/DAST pipeline integration, secrets scanning, dependency analysis
- **Security QA** -- Test strategy, fuzzing, property-based testing, and coverage enforcement
- **Manual Security Review** -- Secure code review against CWE Top 25 and ASVS requirements
- **Final Quality Gate** -- Architecture compliance with /adversary integration for C2+ deliverables
- **Incident Response** -- Post-deployment IR runbooks, vulnerability lifecycle, and remediation tracking

---

## When to Use This Skill

Activate when:

- Designing a new system or service that requires security hardening
- Performing threat modeling on an architecture
- Implementing backend or frontend components with security requirements
- Setting up secure CI/CD pipelines and DevSecOps automation
- Writing security-focused test cases or fuzzing campaigns
- Conducting manual secure code review
- Creating incident response plans or runbooks
- Reviewing deliverables against security standards (OWASP, NIST, CIS, SLSA)
- Planning infrastructure with container security and supply chain integrity

---

## Available Agents

| Agent | Role | Output Location |
|-------|------|-----------------|
| `eng-architect` | Solution Architect and Threat Modeler | `projects/${JERRY_PROJECT}/engagements/{engagement-id}/eng-architect-{topic-slug}.md` |
| `eng-lead` | Engineering Lead and Standards Enforcer | `projects/${JERRY_PROJECT}/engagements/{engagement-id}/eng-lead-{topic-slug}.md` |
| `eng-backend` | Secure Backend Engineer | `projects/${JERRY_PROJECT}/engagements/{engagement-id}/eng-backend-{topic-slug}.md` |
| `eng-frontend` | Secure Frontend Engineer | `projects/${JERRY_PROJECT}/engagements/{engagement-id}/eng-frontend-{topic-slug}.md` |
| `eng-infra` | Secure Infrastructure Engineer | `projects/${JERRY_PROJECT}/engagements/{engagement-id}/eng-infra-{topic-slug}.md` |
| `eng-devsecops` | DevSecOps Pipeline Engineer | `projects/${JERRY_PROJECT}/engagements/{engagement-id}/eng-devsecops-{topic-slug}.md` |
| `eng-qa` | Security QA Engineer | `projects/${JERRY_PROJECT}/engagements/{engagement-id}/eng-qa-{topic-slug}.md` |
| `eng-security` | Security Code Review Specialist | `projects/${JERRY_PROJECT}/engagements/{engagement-id}/eng-security-{topic-slug}.md` |
| `eng-reviewer` | Final Review Gate and Quality Enforcer | `projects/${JERRY_PROJECT}/engagements/{engagement-id}/eng-reviewer-{topic-slug}.md` |
| `eng-incident` | Incident Response Specialist | `projects/${JERRY_PROJECT}/engagements/{engagement-id}/eng-incident-{topic-slug}.md` |

All agents produce output at three levels:
- **L0 (Executive Summary):** Accessible summary for non-technical stakeholders. Answers "What does this mean for the project?"
- **L1 (Technical Detail):** Implementation-focused content with specifics, code examples, and configuration guidance.
- **L2 (Strategic Implications):** Trade-offs, long-term risks, alignment with security posture, and architectural evolution.

---

## Invoking an Agent

### Option 1: Natural Language Request

Simply describe what you need:

```
"Design a secure microservice architecture with threat model"
"Review this API implementation for OWASP Top 10 vulnerabilities"
"Set up a DevSecOps pipeline with SAST and container scanning"
"Create an incident response runbook for credential compromise"
"Test this authentication flow with fuzzing and boundary testing"
```

The orchestrator selects the appropriate agent based on keywords and context.

### Option 2: Explicit Agent Request

Request a specific agent:

```
"Use eng-architect to create a threat model for the payment service"
"Have eng-devsecops design the CI/CD security pipeline"
"I need eng-security to review the authentication module"
```

### Option 3: Native Agent Invocation

Agents are registered via `plugin.json` and discovered by Claude Code automatically. The orchestrator invokes them as named subagents:

```python
Task(
    description="eng-architect: Threat model for payment service",
    subagent_type="eng-architect",
    prompt="""
## ENG CONTEXT (REQUIRED)
- **Engagement ID:** ENG-0042
- **Topic:** Payment Service Threat Model

## TASK
Produce a threat model for the payment service using STRIDE analysis
with DREAD risk scoring. Include architecture diagrams, trust boundaries,
data flow analysis, and prioritized threat matrix.
"""
)
```

Claude Code enforces the agent's `tools` frontmatter — eng-architect only has access to Read, Write, Edit, Glob, Grep, Bash, WebSearch, WebFetch and the Context7 MCP server.

---

## Orchestration Flow

### 8-Step Sequential Phase-Gate Workflow

The /eng-team skill follows an 8-step sequential workflow with phase gates. Each step must complete before the next begins, except Step 3 where three agents execute in parallel.

```
Step 1: eng-architect (Design + Threat Model)
    |
Step 2: eng-lead (Implementation Plan + Security Standards)
    |
Step 3: eng-backend / eng-frontend / eng-infra (Parallel Implementation)
    |
Step 4: eng-devsecops (Automated Security Scans)
    |
Step 5: eng-qa (Testing + Fuzzing)
    |
Step 6: eng-security (Manual Security Review)
    |
Step 7: eng-reviewer (Final Gate + /adversary for C2+)
    |
Step 8: eng-incident (IR Plan + Runbooks, Post-Deployment)
```

**Step 1 -- eng-architect:** Produces the system design, architecture decision records, and threat model (STRIDE/DREAD at minimum). All subsequent agents consume this as their security context.

**Step 2 -- eng-lead:** Receives the architecture and threat model. Produces the implementation plan, coding standards, dependency governance decisions, and security standards mapping.

**Step 3 -- eng-backend / eng-frontend / eng-infra (parallel):** Three agents execute in parallel. Each receives the implementation plan and security standards from eng-lead. Backend handles server-side, frontend handles client-side, infra handles IaC and containers.

**Step 4 -- eng-devsecops:** Receives implementation artifacts. Configures and runs automated security scans: SAST, DAST, secrets scanning, container scanning, dependency analysis. Produces scan results and remediation guidance.

**Step 5 -- eng-qa:** Receives implementation artifacts and scan results. Produces security test cases, fuzzing campaigns, property-based tests, and coverage reports.

**Step 6 -- eng-security:** Receives all prior artifacts. Performs manual secure code review against CWE Top 25 and OWASP ASVS. Produces findings with severity ratings and remediation guidance.

**Step 7 -- eng-reviewer:** Mandatory final gate. Reviews all artifacts for architecture compliance, security standards compliance, and test coverage. Invokes /adversary for C2+ deliverables per R-013 at >= 0.95 quality threshold.

**Step 8 -- eng-incident:** Post-deployment phase. Produces incident response plans, runbooks, monitoring configuration, and vulnerability lifecycle management. Activates independently of the build workflow.

---

## State Passing Between Agents

Agents reference each other's output using state keys:

| Agent | Output Key | Provides |
|-------|------------|----------|
| eng-architect | `architect_output` | System design, threat model, ADRs, trust boundaries |
| eng-lead | `lead_output` | Implementation plan, standards mapping, dependency decisions |
| eng-backend | `backend_output` | Server-side implementation, API security artifacts |
| eng-frontend | `frontend_output` | Client-side implementation, CSP/CORS configuration |
| eng-infra | `infra_output` | IaC templates, container configs, SBOM |
| eng-devsecops | `devsecops_output` | Scan results, pipeline configs, remediation list |
| eng-qa | `qa_output` | Test results, coverage reports, fuzzing findings |
| eng-security | `security_output` | Code review findings, ASVS verification results |
| eng-reviewer | `reviewer_output` | Final gate decision, quality scores, compliance status |
| eng-incident | `incident_output` | IR plans, runbooks, monitoring configuration |

---

## Mandatory Persistence (P-002)

All agents MUST persist their output to files. This ensures:

1. **Context Rot Resistance** -- Findings survive session compaction
2. **Knowledge Accumulation** -- Artifacts build project security knowledge base
3. **Auditability** -- Security decisions can be traced and reviewed
4. **Compliance Evidence** -- Persisted artifacts serve as compliance documentation

### Output Structure

```
projects/${JERRY_PROJECT}/engagements/
└── {engagement-id}/
    ├── eng-architect-{topic-slug}.md
    ├── eng-lead-{topic-slug}.md
    ├── eng-backend-{topic-slug}.md
    ├── eng-frontend-{topic-slug}.md
    ├── eng-infra-{topic-slug}.md
    ├── eng-devsecops-{topic-slug}.md
    ├── eng-qa-{topic-slug}.md
    ├── eng-security-{topic-slug}.md
    ├── eng-reviewer-{topic-slug}.md
    └── eng-incident-{topic-slug}.md
```

---

## Layered SDLC Governance

The /eng-team skill references a 5-layer governance model. Every agent maps to one or more layers:

| Layer | Framework | Purpose | Agents |
|-------|-----------|---------|--------|
| 1. Governance | NIST SP 800-218 SSDF (4 practice groups, 19 practices, 43 tasks) | Organizational security practices | eng-architect, eng-lead, eng-reviewer |
| 2. Lifecycle | Microsoft SDL (5 phases: Requirements, Design, Implementation, Verification, Release) | Phase-gated secure development | All agents |
| 3. Assessment | OWASP SAMM (3 maturity levels across 15 practices) | Maturity measurement | eng-lead, eng-security |
| 4. Supply Chain | Google SLSA (4 build levels) | Build integrity and provenance | eng-infra, eng-devsecops |
| 5. Automation | DevSecOps patterns (CI/CD security gates) | Automated enforcement | eng-devsecops, eng-qa |

Every security activity includes SSDF practice references (e.g., PW.7 for code review, PS.1 for secrets management).

---

## Adversarial Quality Mode

> **SSOT Reference:** `.context/rules/quality-enforcement.md` -- all thresholds, strategy IDs, and criticality levels are defined there. NEVER hardcode values; always reference the SSOT.

The /eng-team skill integrates the adversarial quality framework defined in EPIC-002. Security-critical deliverables receive elevated scrutiny.

### Criticality-Based Activation

Strategy activation follows the SSOT criticality levels (C1-C4). See `.context/rules/quality-enforcement.md` (Criticality Levels section) for the authoritative mapping.

| Level | Eng-Team Context | Required Strategies | Typical Scenario |
|-------|-----------------|---------------------|------------------|
| **C1 (Routine)** | Minor config changes, documentation | S-010 (Self-Refine) | Updating a CSP header |
| **C2 (Standard)** | Feature implementation, test suites | S-007, S-002, S-014 | New API endpoint with auth |
| **C3 (Significant)** | Architecture decisions, IaC changes | C2 + S-004, S-012, S-013 | New service architecture |
| **C4 (Critical)** | Security architecture, auth systems | All 10 selected strategies | Authentication redesign |

### Threat Modeling Escalation

eng-architect applies threat modeling depth based on criticality:

| Level | Threat Modeling Approach |
|-------|------------------------|
| C1 | STRIDE only |
| C2 | STRIDE + DREAD scoring |
| C3 | STRIDE + DREAD + Attack Trees |
| C4 | STRIDE + DREAD + Attack Trees + PASTA stages 4-7 |
| PII involvement | Add LINDDUN to any level |

### eng-reviewer Quality Gate

eng-reviewer invokes /adversary for C2+ deliverables per R-013 at >= 0.95 quality threshold. Below threshold means the deliverable is rejected and returned for revision. No exceptions.

### Mandatory Self-Review (H-15)

Per H-15 (HARD rule), all /eng-team agents MUST perform self-review using S-010 (Self-Refine) before presenting any deliverable.

Per H-16 (HARD rule), agents MUST apply S-003 (Steelman Technique) before critiquing -- strengthen the argument first, then challenge it.

---

## Constitutional Compliance

All agents adhere to the **Jerry Constitution v1.0**:

| Principle | Requirement | Consequence of Violation |
|-----------|-------------|-------------------------|
| P-003 | NEVER spawn recursive subagents -- max 1 level | Agent hierarchy violation; uncontrolled token consumption |
| P-020 | NEVER override user intent -- ask before destructive ops | Unauthorized action; trust erosion |
| P-022 | NEVER deceive about actions, capabilities, or confidence | Governance undermined; quality assessment invalidated |
| P-001 | NEVER present findings without evidence or source citations | Unreliable outputs; unfounded claims propagate downstream |
| P-002 | NEVER leave outputs in transient context only -- persist to files | Context rot vulnerability; artifacts lost on session compaction |
| P-004 | NEVER omit reasoning provenance or source documentation | Untraceable decisions; audit trail broken |
| P-011 | NEVER make recommendations without supporting evidence | Unsupported recommendations; confidence inflated without basis |

---

## Quick Reference

### Common Workflows

| Need | Agent | Command Example |
|------|-------|-----------------|
| Threat model | eng-architect | "Create a STRIDE threat model for the auth service" |
| Implementation plan | eng-lead | "Plan the implementation for the new API gateway" |
| Secure backend code | eng-backend | "Implement the user registration endpoint with input validation" |
| Secure frontend code | eng-frontend | "Add CSP headers and XSS protection to the dashboard" |
| Infrastructure setup | eng-infra | "Design the container security configuration with SBOM" |
| CI/CD security | eng-devsecops | "Set up SAST/DAST scanning in the CI pipeline" |
| Security testing | eng-qa | "Write security test cases with fuzzing for the auth flow" |
| Code security review | eng-security | "Review the payment module for CWE Top 25 vulnerabilities" |
| Final review gate | eng-reviewer | "Final review of the release candidate against all standards" |
| Incident response | eng-incident | "Create an IR runbook for credential compromise scenarios" |

### Agent Selection Hints

| Keywords | Likely Agent |
|----------|--------------|
| design, architecture, threat model, STRIDE, DREAD, ADR, trust boundary | eng-architect |
| plan, standards, dependencies, code standards, lead, SAMM | eng-lead |
| backend, API, server, auth, database, input validation, OWASP Top 10 | eng-backend |
| frontend, XSS, CSP, CORS, client, browser, output encoding | eng-frontend |
| infrastructure, IaC, container, secrets, SBOM, SLSA, supply chain | eng-infra |
| pipeline, SAST, DAST, CI/CD, scanning, DevSecOps, automation | eng-devsecops |
| test, QA, fuzzing, coverage, boundary testing, property-based | eng-qa |
| code review, CWE, ASVS, manual review, vulnerability, security review | eng-security |
| final review, quality gate, compliance, release, /adversary | eng-reviewer |
| incident, runbook, response, monitoring, post-deployment, remediation | eng-incident |

---

## Agent Details

For detailed agent specifications, see:

- `skills/eng-team/agents/eng-architect.md`
- `skills/eng-team/agents/eng-lead.md`
- `skills/eng-team/agents/eng-backend.md`
- `skills/eng-team/agents/eng-frontend.md`
- `skills/eng-team/agents/eng-infra.md`
- `skills/eng-team/agents/eng-devsecops.md`
- `skills/eng-team/agents/eng-qa.md`
- `skills/eng-team/agents/eng-security.md`
- `skills/eng-team/agents/eng-reviewer.md`
- `skills/eng-team/agents/eng-incident.md`

---

## Routing Disambiguation

> When this skill is the wrong choice and what happens if misrouted.

| Condition | Use Instead | Consequence of Misrouting |
|-----------|-------------|--------------------------|
| Offensive security testing or penetration testing | `/red-team` | Defensive security methodology (STRIDE/DREAD threat modeling, OWASP ASVS compliance) applied to offensive tasks produces security architecture artifacts instead of attack narratives; 10 security-focused agents loaded when task requires offensive methodology |
| Adversarial quality review or tournament scoring | `/adversary` | Eng-team agents evaluate security compliance, not deliverable quality; S-014 scoring rubric and adversarial strategy templates not loaded |
| General code review without security focus | `/problem-solving` (ps-reviewer) | 10 security-specific agents loaded into context when task requires routine defect detection; OWASP/NIST/CIS governance overhead applied to non-security review |
| Root cause analysis or debugging | `/problem-solving` (ps-investigator) | Security methodology (STRIDE, CWE analysis) applied to general investigation produces threat models instead of causal chains; root cause not isolated |
| Requirements engineering or V&V | `/nasa-se` | Eng-team produces security requirements and threat models, not general requirements; NASA SE traceability and V&V methodology absent |
| Architecture design without security requirements | `/architecture` | Eng-team loads security governance layers (NIST SSDF, MS SDL, SLSA) that add overhead when task is pure structural design; hexagonal architecture methodology is in `/architecture` |
| General research or landscape survey | `/problem-solving` (ps-researcher) | Eng-team agents are implementation-focused; no divergent research methodology for technology surveys |

---

## References and Traceability

### Architecture Decision Records

| ADR | Title | Relevance |
|-----|-------|-----------|
| [ADR-PROJ010-001](../../projects/PROJ-010-cyber-ops/decisions/ADR-PROJ010-001-agent-team-architecture.md) | Agent Team Architecture | 10-agent roster (AD-002), 8-step workflow, capability boundaries, SDLC governance (AD-008), threat modeling methodology (AD-009), standalone design (AD-010) |
| [ADR-PROJ010-002](../../projects/PROJ-010-cyber-ops/decisions/ADR-PROJ010-002-skill-routing-invocation.md) | Skill Routing & Invocation | SKILL.md structure, keyword triggers, routing table, workflow patterns, circuit breaker integration |
| [ADR-PROJ010-003](../../projects/PROJ-010-cyber-ops/decisions/ADR-PROJ010-003-llm-portability.md) | LLM Portability | 38-field portable agent schema, body_format: markdown, RCCF prompt assembly, provider adapters |

### Architecture Decisions Implemented

| AD | Title | Implementation |
|----|-------|---------------|
| AD-001 | Methodology-First Design | All agents produce methodology guidance, not autonomous execution |
| AD-002 | 21-Agent Roster (10 eng + 11 red) | 10 /eng-team agents defined per roster specification |
| AD-008 | Five-Layer SDLC Governance | SSDF + MS SDL + SAMM + SLSA + DevSecOps in Layered SDLC Governance section |
| AD-009 | STRIDE+DREAD Default Threat Modeling | eng-architect criticality-based escalation (C1-C4) with LINDDUN for PII |
| AD-010 | Standalone Capable Design | All agents implement 3-level tool degradation (Level 0/1/2) |

### Phase 1 Research Provenance

| Artifact | Title | Contribution |
|----------|-------|-------------|
| A-001 through A-004 | Role Completeness Analysis | Validated 10-agent roster against elite organizations (Google, Microsoft, CrowdStrike, Mandiant) |
| B-003 | Security Standards Analysis | OWASP, NIST, CIS, SANS standards mapped to per-agent responsibilities |
| F-001 | SDLC Framework Comparison | MS SDL phase-to-agent mapping, SSDF practice-to-agent mapping |
| S-002 | Architecture Implications Synthesis | Agent architecture specification input, handoff protocols, cross-skill integration |

### Standards References

| Standard | Version | URL |
|----------|---------|-----|
| NIST SP 800-218 SSDF | v1.1 (2022) | https://csrc.nist.gov/publications/detail/sp/800-218/final |
| Microsoft SDL | 2024 | https://www.microsoft.com/en-us/securityengineering/sdl |
| OWASP ASVS | v5.0 (2025) | https://owasp.org/www-project-application-security-verification-standard/ |
| OWASP Top 10 | 2021 | https://owasp.org/www-project-top-ten/ |
| CWE Top 25 | 2025 | https://cwe.mitre.org/top25/archive/2025/2025_cwe_top25.html |
| Google SLSA | v1.0 (2023) | https://slsa.dev/spec/v1.0/ |
| OWASP SAMM | v2.0 | https://owaspsamm.org/ |
| CIS Benchmarks | Various | https://www.cisecurity.org/cis-benchmarks |
| NIST CSF | v2.0 (2024) | https://www.nist.gov/cyberframework |
| NIST SP 800-61 | r3 (2024) | https://csrc.nist.gov/publications/detail/sp/800-61/rev-3/final |

### Feature Traceability

| Feature | Title | Status |
|---------|-------|--------|
| FEAT-020 | SKILL.md & Routing | Completed |
| FEAT-021 | Architecture Agents (eng-architect, eng-lead) | Completed |
| FEAT-022 | Implementation Agents (eng-backend, eng-frontend, eng-infra) | Completed |
| FEAT-023 | Quality Agents (eng-qa, eng-security, eng-reviewer, eng-devsecops, eng-incident) | Completed |
| FEAT-024 | Templates & Playbook | Pending |
| FEAT-025 | /adversary Integration | Pending |

---

*Skill Version: 1.0.0*
*Constitutional Compliance: Jerry Constitution v1.0*
*PROJ-010: Cyber Ops -- Secure Engineering Team*
*Last Updated: 2026-02-22*

Related Skills

red-team

16
from geekatron/jerry

Offensive security team skill providing methodology guidance for penetration testing and red team engagements. Invoked when users request penetration testing, reconnaissance, vulnerability analysis, exploitation methodology, social engineering, C2 infrastructure, or engagement reporting. Routes to 11 specialized agents covering the full MITRE ATT&CK kill chain. All engagements require red-lead scope authorization before any other agent. Follows PTES, OSSTMM, and ATT&CK methodology frameworks.

ux-lean-ux

16
from geekatron/jerry

Lean UX hypothesis-driven design sub-skill for the /user-experience parent skill. Facilitates Build-Measure-Learn cycles using Jeff Gothelf and Josh Seiden's Lean UX methodology (3rd ed. 2021). Produces hypothesis backlogs, assumption maps, MVP experiment designs, and validated learning logs. Invoke when teams need hypothesis-driven iteration, assumption mapping, experiment design, or validated learning documentation. Invoked by ux-orchestrator during Wave 2 lifecycle-stage routing or when user intent is "testing hypotheses" during the "During design" stage. Triggers: lean UX, hypothesis, assumption mapping, build-measure-learn, MVP experiment, validated learning, experiment design, hypothesis backlog.

ux-kano-model

16
from geekatron/jerry

Kano model feature classification and prioritization sub-skill for the /user-experience parent skill. Classifies product features into Must-be (M), Performance (O), Attractive (A), Indifferent (I), and Reverse (R) categories using the functional/dysfunctional questionnaire pair methodology (Kano et al., 1984). Computes Customer Satisfaction (CS) coefficients (Better/Worse) for priority matrix visualization. Produces feature classification reports, priority matrices, and survey design templates. Sample size awareness: 5-8 respondents yields directional classification only (MEDIUM confidence); 20+ respondents required for statistical classification (Berger et al., 1993). Invoked by ux-orchestrator during Wave 4 lifecycle-stage routing or when user intent is "Need to prioritize features" at any lifecycle stage. Triggers: Kano, must-be, attractive, one-dimensional, performance feature, satisfaction, feature classification, delighter, feature prioritization, CS coefficient.

ux-jtbd

16
from geekatron/jerry

Jobs-to-Be-Done research and analysis sub-skill for the /user-experience parent skill. Conducts JTBD job statement synthesis, switch interview analysis (Moesta/Spiek four forces), outcome-driven innovation (Ulwick ODI), and job mapping for tiny teams (1-5 people). Invoked by ux-orchestrator when users need to understand user motivations, map jobs to be done, identify switch triggers, or produce job maps with outcome expectations. Sub-skill of /user-experience; routed via ux-orchestrator lifecycle-stage triage. Triggers: JTBD, jobs to be done, switch interview, job mapping, user motivation, outcome, hiring criteria, user jobs, switch forces.

ux-inclusive-design

16
from geekatron/jerry

Inclusive design and WCAG 2.2 accessibility evaluation sub-skill for the /user-experience parent skill. Performs WCAG 2.2 compliance audits across Perceivable, Operable, Understandable, and Robust principles (conformance levels A, AA, AAA) and applies Microsoft Inclusive Design methodology including Persona Spectrum analysis (permanent, temporary, situational disabilities). Produces accessibility audit reports and persona spectrum analyses. Invoke when teams need accessibility compliance evaluation, WCAG conformance auditing, screen reader compatibility assessment, color contrast analysis, cognitive load evaluation, or inclusive design review. Invoked by ux-orchestrator during Wave 3 lifecycle-stage routing or when user intent is "Check accessibility" at any lifecycle stage. Triggers: accessibility, WCAG, ARIA, screen reader, contrast, cognitive load, inclusive, a11y, inclusive design, WCAG 2.2, persona spectrum.

ux-heuristic-eval

16
from geekatron/jerry

Nielsen heuristic evaluation sub-skill for the /user-experience parent skill. Evaluates interfaces against Nielsen's 10 usability heuristics, produces severity-rated findings on a 0-4 scale (Cosmetic to Catastrophic), and generates remediation recommendations with effort estimates. Invoke when teams need structured usability evaluation, interface review, heuristic audit, or severity-rated UX findings. Invoked by ux-orchestrator during Wave 1 lifecycle-stage routing or CRISIS mode triage. Triggers: heuristic evaluation, usability audit, Nielsen heuristics, interface review, severity rating, usability inspection, UX evaluation.

ux-heart-metrics

16
from geekatron/jerry

HEART Metrics framework sub-skill for the /user-experience parent skill. Applies Google's HEART framework (Happiness, Engagement, Adoption, Retention, Task Success) using the Goals-Signals-Metrics (GSM) process to define measurable UX metrics for products and features. Invoked by ux-orchestrator when users need to measure UX health, define UX metrics, establish measurement baselines, or produce dashboard-ready metric specifications. Sub-skill of /user-experience; routed via ux-orchestrator lifecycle-stage triage. Triggers: HEART, metrics, happiness, engagement, adoption, retention, task success, GSM, measurement, UX metrics, dashboard, goals signals metrics.

ux-design-sprint

16
from geekatron/jerry

AJ&Smart Design Sprint 2.0 facilitation sub-skill for the /user-experience parent skill. Facilitates a structured four-day rapid prototyping and validation process compressed from the Google Ventures five-day Design Sprint (Knapp, Zeratsky & Kowitz, 2016; Courtney, 2019). Produces sprint artifacts including challenge maps, solution sketches, storyboards, realistic prototypes, and structured user interview findings with synthesis confidence gates. Invoke when teams need to rapidly validate a product concept, solve a critical design challenge through structured prototyping, test ideas with real users before committing to development, or explore solution directions when they do not know what to build. Triggers: design sprint, GV sprint, rapid prototyping, sprint week, map sketch decide test, 4-day sprint, design sprint 2.0, AJ Smart sprint, validate prototype, test with users, sprint facilitation.

ux-behavior-design

16
from geekatron/jerry

Fogg Behavior Model B=MAP bottleneck diagnosis sub-skill for the /user-experience parent skill. Diagnoses why users fail to take desired actions by analyzing the three B=MAP factors (Motivation, Ability, Prompt) and identifying which factor falls below the action threshold. Produces bottleneck diagnoses, factor-level assessments, and intervention recommendations with synthesis confidence gates. Invoke when teams need to understand why users are not completing a specific action, diagnose behavioral bottlenecks, design behavior change interventions, or analyze post-launch user inaction patterns. Invoked by ux-orchestrator during Wave 4 lifecycle-stage routing or when user intent is "Users not completing action" during the "After launch" stage. Triggers: behavior design, B=MAP, Fogg model, behavior bottleneck, motivation analysis, ability analysis, prompt design, why users don't, user inaction, behavior diagnosis, tiny habits, action threshold.

ux-atomic-design

16
from geekatron/jerry

Atomic Design component taxonomy sub-skill for the /user-experience parent skill. Implements Brad Frost's 5-level component hierarchy (Atoms, Molecules, Organisms, Templates, Pages) for design system architecture. Produces component inventories, design token audits, composition rules, and Storybook coverage reports. Invoke when teams need component taxonomy construction, design system architecture, Storybook integration, design token consistency analysis, or component reuse auditing. Invoked by ux-orchestrator during Wave 3 lifecycle-stage routing or when user intent is "Building component system" during the "During design" stage. Triggers: atomic design, component taxonomy, design tokens, Storybook, atoms molecules organisms, design system, component inventory, component library.

ux-ai-first-design

16
from geekatron/jerry

AI-first interaction design sub-skill (CONDITIONAL) for the /user-experience parent skill. Provides trust-calibrated AI interaction design guidance using Yang et al.'s trust-risk and error-risk classification framework. Produces interaction pattern recommendations, trust calibration assessments, feedback loop designs, and progressive disclosure strategies for AI-powered features. CONDITIONAL: requires WSM >= 7.80 AND enabler research (FEAT-020) complete; otherwise routes to /ux-heuristic-eval with PAIR protocol. Invoke when teams need to design AI-powered interactions, calibrate user trust in AI outputs, classify AI error risks, design human-AI handoff patterns, or audit existing AI interfaces for trust and safety. Triggers: AI-first design, AI interaction, trust calibration, AI UX, conversational UX, AI interface, LLM interface, agentic UX, human-AI interaction, AI transparency, AI error handling, AI onboarding, progressive AI disclosure, trust-risk, error-risk.

user-experience

16
from geekatron/jerry

Parent orchestrator for AI-augmented UX methodology targeting tiny teams (1-5 people). Routes to 10 sub-skills by product lifecycle stage through criteria-gated waves. Invoke when team needs structured UX evaluation, user research, design systems, UX metrics, behavior diagnosis, feature prioritization, design sprints, or AI interaction design. Each sub-skill implements a proven UX framework with synthesis hypothesis confidence gates and MCP design tool integration. Triggers: UX, user experience, usability, heuristic evaluation, JTBD, lean UX, HEART metrics, atomic design, inclusive design, behavior design, Kano model, design sprint, AI-first design, UX audit, accessibility, design system, user research.