Skip to content

Preparing Archive

Core
4d 1h ago
Reviewed

security-bluebook-builder

Create or refine a concise, normative security policy ("Blue Book") for sensitive applications. Use when users need a threat model, data classification rules, auth/session policy, logging and audit requirements, retention/deletion expectations, incident response, or security...

.agents/skills/security-bluebook-builder TypeScript
TY
MA
2+ layers Tracked stack
Capabilities
0
Signals
0
Related
3
0
Capabilities
Actionable behaviors documented in the skill body.
0
Phases
Operational steps available for guided execution.
0
References
Support files available for deeper usage and onboarding.
0
Scripts
Runnable or reusable automation artifacts discovered locally.

Architectural Overview

Skill Reading

"This module is grounded in security patterns and exposes 1 core capabilities across 1 execution phases."

Security Bluebook Builder

Overview

Build a minimal but real security policy for sensitive apps. The output is a single, coherent Blue Book document using MUST/SHOULD/CAN language, with explicit assumptions, scope, and security gates.

Workflow

1) Gather inputs (ask only if missing)

Collect just enough context to fill the template. If the user has not provided details, ask up to 6 short questions:

  • What data classes are handled (PII, PHI, financial, tokens, content)?
  • What are the trust boundaries (client/server/third parties)?
  • How do users authenticate (OAuth, email/password, SSO, device sessions)?
  • What storage is used (DB, object storage, logs, analytics)?
  • What connectors or third parties are used?
  • Retention and deletion expectations (default + user-initiated)?

If the user cannot answer, proceed with safe defaults and mark TODOs.

2) Draft the Blue Book

Load references/bluebook_template.md and fill it with the provided details. Keep it concise, deterministic, and enforceable.

3) Enforce guardrails

  • Do not include secrets, tokens, or internal credentials.
  • If something is unknown, write "TODO" plus a clear assumption.
  • Fail closed: if a capability is required but unavailable, call it out explicitly.
  • Keep scope minimal; do not add features or tools beyond what the user asked for.

4) Quality checks

Confirm the Blue Book includes:

  • Threat model (assumptions + out-of-scope)
  • Data classification + handling rules
  • Trust boundaries + controls
  • Auth/session policy
  • Token handling policy
  • Logging/audit policy
  • Retention/deletion
  • Incident response mini-runbook
  • Security gates + go/no-go checklist

Resources

  • references/bluebook_template.md

Primary Stack

TypeScript

Tooling Surface

Guide only

Workspace Path

.agents/skills/security-bluebook-builder

Operational Ecosystem

The complete hardware and software toolchain required.

This skill is mostly documentation-driven and does not expose extra scripts, references, examples, or templates.

Module Topology

Skill File
Parsed metadata
Skills UI
Launch context
Chat Session
Antigravity Core

Antigravity Core

Principal Engineering Agent

A high-performance agentic architecture developed by Deepmind for autonomous coding tasks.
120 Installs
4.2 Reliability
1 Workspace Files
4.2
Workspace Reliability Avg
5
68%
4
22%
3
10%
2
0%
1
0%
No explicit validation signals were parsed for this skill yet, but the module remains available for inspection and chat launch.

Recommended for this workflow

Adjacent modules that complement this skill surface

Loading content
Cart