security-bluebook-builder▌
sickn33/antigravity-awesome-skills · updated Apr 8, 2026
Build a minimal but real security policy for sensitive apps. The output is a single, coherent Blue Book document using MUST/SHOULD/CAN language, with explicit assumptions, scope, and security gates.
Security Bluebook Builder
When to Use
- You need a concise but enforceable security policy for an app handling sensitive data.
- You want a single Blue Book document with explicit assumptions, controls, and go/no-go gates.
- The user needs policy guidance grounded in scope, threat model, and operational security defaults rather than generic advice.
Overview
Build a minimal but real security policy for sensitive apps. The output is a single, coherent Blue Book document using MUST/SHOULD/CAN language, with explicit assumptions, scope, and security gates.
Workflow
1) Gather inputs (ask only if missing)
Collect just enough context to fill the template. If the user has not provided details, ask up to 6 short questions:
- What data classes are handled (PII, PHI, financial, tokens, content)?
- What are the trust boundaries (client/server/third parties)?
- How do users authenticate (OAuth, email/password, SSO, device sessions)?
- What storage is used (DB, object storage, logs, analytics)?
- What connectors or third parties are used?
- Retention and deletion expectations (default + user-initiated)?
If the user cannot answer, proceed with safe defaults and mark TODOs.
2) Draft the Blue Book
Load references/bluebook_template.md and fill it with the provided details. Keep it concise, deterministic, and enforceable.
3) Enforce guardrails
- Do not include secrets, tokens, or internal credentials.
- If something is unknown, write "TODO" plus a clear assumption.
- Fail closed: if a capability is required but unavailable, call it out explicitly.
- Keep scope minimal; do not add features or tools beyond what the user asked for.
4) Quality checks
Confirm the Blue Book includes:
- Threat model (assumptions + out-of-scope)
- Data classification + handling rules
- Trust boundaries + controls
- Auth/session policy
- Token handling policy
- Logging/audit policy
- Retention/deletion
- Incident response mini-runbook
- Security gates + go/no-go checklist
Resources
references/bluebook_template.md
Discussion
Product Hunt–style comments (not star reviews)- No comments yet — start the thread.
Ratings
4.6★★★★★62 reviews- ★★★★★Layla Okafor· Dec 24, 2024
I recommend security-bluebook-builder for anyone iterating fast on agent tooling; clear intent and a small, reviewable surface area.
- ★★★★★Amina Gonzalez· Dec 20, 2024
We added security-bluebook-builder from the explainx registry; install was straightforward and the SKILL.md answered most questions upfront.
- ★★★★★Daniel Reddy· Dec 8, 2024
Keeps context tight: security-bluebook-builder is the kind of skill you can hand to a new teammate without a long onboarding doc.
- ★★★★★Layla Abbas· Dec 4, 2024
security-bluebook-builder fits our agent workflows well — practical, well scoped, and easy to wire into existing repos.
- ★★★★★William Jain· Nov 27, 2024
security-bluebook-builder has been reliable in day-to-day use. Documentation quality is above average for community skills.
- ★★★★★Sophia Zhang· Nov 19, 2024
security-bluebook-builder fits our agent workflows well — practical, well scoped, and easy to wire into existing repos.
- ★★★★★William Kapoor· Nov 15, 2024
security-bluebook-builder reduced setup friction for our internal harness; good balance of opinion and flexibility.
- ★★★★★Layla Abebe· Oct 18, 2024
Solid pick for teams standardizing on skills: security-bluebook-builder is focused, and the summary matches what you get after install.
- ★★★★★Daniel Singh· Oct 10, 2024
We added security-bluebook-builder from the explainx registry; install was straightforward and the SKILL.md answered most questions upfront.
- ★★★★★Daniel Rao· Oct 6, 2024
Registry listing for security-bluebook-builder matched our evaluation — installs cleanly and behaves as described in the markdown.
showing 1-10 of 62