agent security skill risk: medium
Security Bluebook Policy Builder
Builds a minimal security policy document called a Blue Book for apps handling sensitive data, using MUST/SHOULD/CAN language with explicit assumptions, scope, and go/no-go gates.…
- Policy sensitive
- Human review
SKILL 1 file
SKILL.md
--- name: security-bluebook-builder description: "Build a minimal but real security policy for sensitive apps. The output is a single, coherent Blue Book document using MUST/SHOULD/CAN language, with explicit assumptions, scope, and security gates." --- # Security Bluebook Builder ## When to Use - You need a concise but enforceable security policy for an app handling sensitive data. - You want a single Blue Book document with explicit assumptions, controls, and go/no-go gates. - The user needs policy guidance grounded in scope, threat model, and operational security defaults rather than generic advice. ## Overview Build a minimal but real security policy for sensitive apps. The output is a single, coherent Blue Book document using MUST/SHOULD/CAN language, with explicit assumptions, scope, and security gates. ## Workflow ### 1) Gather inputs (ask only if missing) Collect just enough context to fill the template. If the user has not provided details, ask up to 6 short questions: - What data classes are handled (PII, PHI, financial, tokens, content)? - What are the trust boundaries (client/server/third parties)? - How do users authenticate (OAuth, email/password, SSO, device sessions)? - What storage is used (DB, object storage, logs, analytics)? - What connectors or third parties are used? - Retention and deletion expectations (default + user-initiated)? If the user cannot answer, proceed with safe defaults and mark TODOs. ### 2) Draft the Blue Book Load `references/bluebook_template.md` and fill it with the provided details. Keep it concise, deterministic, and enforceable. ### 3) Enforce guardrails - Do not include secrets, tokens, or internal credentials. - If something is unknown, write "TODO" plus a clear assumption. - Fail closed: if a capability is required but unavailable, call it out explicitly. - Keep scope minimal; do not add features or tools beyond what the user asked for. ### 4) Quality checks Confirm the Blue Book includes: - Threat model (assumptions + out-of-scope) - Data classification + handling rules - Trust boundaries + controls - Auth/session policy - Token handling policy - Logging/audit policy - Retention/deletion - Incident response mini-runbook - Security gates + go/no-go checklist ## Resources - `references/bluebook_template.md` ## Limitations - Use this skill only when the task clearly matches the scope described above. - Do not treat the output as a substitute for environment-specific validation, testing, or expert review. - Stop and ask for clarification if required inputs, permissions, safety boundaries, or success criteria are missing.
REQUIRED CONTEXT
- data classes handled
- trust boundaries
- authentication method
- storage used
- third-party connectors
- retention/deletion rules
ROLES & RULES
- Do not include secrets, tokens, or internal credentials.
- If something is unknown, write "TODO" plus a clear assumption.
- Fail closed: if a capability is required but unavailable, call it out explicitly.
- Keep scope minimal; do not add features or tools beyond what the user asked for.
- Use this skill only when the task clearly matches the scope described above.
- Do not treat the output as a substitute for environment-specific validation, testing, or expert review.
- Stop and ask for clarification if required inputs, permissions, safety boundaries, or success criteria are missing.
EXPECTED OUTPUT
- Format
- markdown
- Constraints
- single coherent Blue Book document
- use MUST/SHOULD/CAN language
- include threat model, data classification, trust boundaries, auth policy, logging, retention, incident response, and security gates
- mark unknowns as TODO with assumptions
- no secrets or credentials
SUCCESS CRITERIA
- Confirm the Blue Book includes threat model (assumptions + out-of-scope)
- Confirm the Blue Book includes data classification + handling rules
- Confirm the Blue Book includes trust boundaries + controls
- Confirm the Blue Book includes auth/session policy
- Confirm the Blue Book includes token handling policy
- Confirm the Blue Book includes logging/audit policy
- Confirm the Blue Book includes retention/deletion
- Confirm the Blue Book includes incident response mini-runbook
- Confirm the Blue Book includes security gates + go/no-go checklist
CAVEATS
- Dependencies
- Requires references/bluebook_template.md
- Missing context
- The content or schema of the referenced bluebook_template.md
- Preferred output format or length constraints for the final Blue Book
- Ambiguities
- References external file `references/bluebook_template.md` without providing its contents or structure.
- States 'ask up to 6 short questions' but does not specify exact fallback behavior when answers are partial.
QUALITY
- OVERALL
- 0.80
- CLARITY
- 0.85
- SPECIFICITY
- 0.80
- REUSABILITY
- 0.75
- COMPLETENESS
- 0.80
IMPROVEMENT SUGGESTIONS
- Inline or summarize the bluebook_template.md structure so the prompt is self-contained.
- Add an explicit instruction for output length or section ordering to increase determinism.
USAGE
Copy the prompt above and paste it into your AI of choice — Claude, ChatGPT, Gemini, or anywhere else you're working. Replace any placeholder sections with your own context, then ask for the output.
MORE FOR AGENT
- MoltPass Client for AI Agent Identitiesagentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Threat Modeling Security Expertagentsecurity
- Security Bluebook Policy Builderagentsecurity
- Security Blue Book Policy Builderagentsecurity
- Threat Modeling Security Architecture Expertagentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Threat Modeling Security Expertagentsecurity
- SIEM Detection Rule Tuning Guideagentsecurity
- AI File Metadata Compliance Auditoragentsecurity
- Azure Storage Misconfiguration Audit Reporteragentsecurity
- Implementing PAM for Database Accessagentsecurity
- AFL++ Coverage-Guided Fuzzing Procedureagentsecurity
- Supply Chain Attack Simulation Detectoragentsecurity
- Security Audit Fix Verifieragentsecurity
- Active Directory ACL Abuse Analyzeragentsecurity
- Privileged Access Workstation Implementation Guideagentsecurity
- SSRF Vulnerability Testing and Reporting Guideagentsecurity
- Security Audit Fix Revieweragentsecurity
- AWS IAM Privilege Escalation Detectoragentsecurity
- SSL/TLS Security Assessment with Sslyzeagentsecurity
- GCP Penetration Testing with GCPBucketBruteagentsecurity
- AWS CloudTrail Anomaly Detection Guideagentsecurity
- Security Audit Fix Commit Revieweragentsecurity