Smithery Logo
MCPsSkillsDocsPricing
Login
Smithery Logo

Accelerating the Agent Economy

Resources

DocumentationPrivacy PolicySystem Status

Company

PricingAboutBlog

Connect

© 2026 Smithery. All rights reserved.

    bacoco

    bmad-security-review

    bacoco/bmad-security-review
    Security
    62
    4 installs

    About

    SKILL.md

    Install

    Install via Skills CLI

    or add to your agent
    • Claude Code
      Claude Code
    • Codex
      Codex
    • OpenClaw
      OpenClaw
    • Cursor
      Cursor
    • Amp
      Amp
    • GitHub Copilot
      GitHub Copilot
    • Gemini CLI
      Gemini CLI
    • Kilo Code
      Kilo Code
    • Junie
      Junie
    • Replit
      Replit
    • Windsurf
      Windsurf
    • Cline
      Cline
    • Continue
      Continue
    • OpenCode
      OpenCode
    • OpenHands
      OpenHands
    • Roo Code
      Roo Code
    • Augment
      Augment
    • Goose
      Goose
    • Trae
      Trae
    • Zencoder
      Zencoder
    • Antigravity
      Antigravity
    ├─
    ├─
    └─

    About

    Hardens designs and implementations with structured security reviews.

    SKILL.md

    BMAD Security Review Skill

    When to Invoke

    Activate this skill whenever the user:

    • Requests a security, privacy, or compliance review of a feature or system.
    • Mentions threat modeling, secure design, risk assessment, or penetration testing.
    • Asks for guidance on hardening infrastructure, APIs, data flows, or deployment pipelines.
    • Needs a remediation backlog prior to launch or certification.
    • Receives external audit findings that must be triaged and addressed.

    Do not invoke when the user only needs implementation help with security stories—route those to bmad-development-execution once the remediation plan exists.

    Mission

    Protect the product by exposing security risks early, prioritizing fixes, and embedding mitigations into the delivery plan. Deliver artifacts that downstream skills and teams can execute without ambiguity.

    Inputs Required

    • Architecture decisions, diagrams, or code references (docs/architecture.md, repositories, infrastructure manifests).
    • Current product requirements, especially data handling and auth flows.
    • Any existing penetration test reports, compliance requirements, or known incidents.
    • Deployment environment details (cloud provider, runtimes, integrations).

    If critical context is missing, schedule discovery steps in WORKFLOW.md before producing findings.

    Outputs

    • Threat model covering data flows, trust boundaries, STRIDE analysis, and mitigations using templates in assets/.
    • Security gap assessment summarizing findings by severity with clear owners and due dates.
    • Remediation backlog with prioritized user stories and acceptance criteria ready for bmad-story-planning.
    • Optional compliance checklists (SOC2, HIPAA, GDPR) when requested.

    Process

    1. Confirm prerequisites are satisfied (architecture + test strategy). Request missing artifacts.
    2. Map system boundaries and data classifications. Document entry points and critical assets.
    3. Run threat modeling workshops: enumerate threats via STRIDE/LINDDUN and rate likelihood × impact.
    4. Review code, dependencies, and infrastructure for known vulnerabilities or misconfigurations.
    5. Summarize findings with severity, evidence, and references to assets or standards violated.
    6. Translate mitigations into actionable backlog items. Align with release timelines.
    7. Provide launch go/no-go recommendation and residual risk statement.

    Quality Gates

    • No critical/high risks without documented mitigation and owner.
    • Threat model reviewed against latest architecture diagram.
    • Remediation backlog linked to acceptance criteria consumable by dev/test skills.
    • Compliance requirements traced to controls or follow-up activities.

    Error Handling

    • If findings rely on missing context, pause and obtain evidence before finalizing reports.
    • Escalate systemic issues (e.g., absence of IAM, encryption gaps) to product leadership via orchestrator.
    • Document assumptions; flag when runtime verification (DAST/SAST) is required beyond conversational review.
    Recommended Servers
    AurelianFlo
    AurelianFlo
    OpenZeppelin
    OpenZeppelin
    Agent Safe Message MCP
    Agent Safe Message MCP
    Repository
    bacoco/bmad-skills
    Files