home / skills / bacoco / bmad-skills / bmad-security-review
This skill hardens designs and implementations by conducting structured security reviews, identifying threats, and delivering actionable mitigations.
npx playbooks add skill bacoco/bmad-skills --skill bmad-security-reviewReview the files below or copy the command above to add this skill to your agents.
---
name: bmad-security-review
description: Hardens designs and implementations with structured security reviews.
allowed-tools: ["Read", "Write", "Grep"]
metadata:
auto-invoke: true
triggers:
patterns:
- "threat model"
- "security review"
- "penetration test"
- "secure this"
- "hardening plan"
- "security requirements"
- "compliance gap"
keywords:
- security
- threat-model
- vulnerability
- secure
- harden
- compliance
- privacy
capabilities:
- threat-modeling
- secure-design
- dependency-audit
- remediation-planning
- compliance-checks
prerequisites:
- bmad-architecture-design
- bmad-test-strategy
outputs:
- threat-model
- security-gap-assessment
- remediation-backlog
---
# BMAD Security Review Skill
## When to Invoke
Activate this skill whenever the user:
- Requests a security, privacy, or compliance review of a feature or system.
- Mentions threat modeling, secure design, risk assessment, or penetration testing.
- Asks for guidance on hardening infrastructure, APIs, data flows, or deployment pipelines.
- Needs a remediation backlog prior to launch or certification.
- Receives external audit findings that must be triaged and addressed.
Do **not** invoke when the user only needs implementation help with security stories—route those to `bmad-development-execution` once the remediation plan exists.
## Mission
Protect the product by exposing security risks early, prioritizing fixes, and embedding mitigations into the delivery plan. Deliver artifacts that downstream skills and teams can execute without ambiguity.
## Inputs Required
- Architecture decisions, diagrams, or code references (`docs/architecture.md`, repositories, infrastructure manifests).
- Current product requirements, especially data handling and auth flows.
- Any existing penetration test reports, compliance requirements, or known incidents.
- Deployment environment details (cloud provider, runtimes, integrations).
If critical context is missing, schedule discovery steps in `WORKFLOW.md` before producing findings.
## Outputs
- **Threat model** covering data flows, trust boundaries, STRIDE analysis, and mitigations using templates in `assets/`.
- **Security gap assessment** summarizing findings by severity with clear owners and due dates.
- **Remediation backlog** with prioritized user stories and acceptance criteria ready for `bmad-story-planning`.
- Optional compliance checklists (SOC2, HIPAA, GDPR) when requested.
## Process
1. Confirm prerequisites are satisfied (architecture + test strategy). Request missing artifacts.
2. Map system boundaries and data classifications. Document entry points and critical assets.
3. Run threat modeling workshops: enumerate threats via STRIDE/LINDDUN and rate likelihood × impact.
4. Review code, dependencies, and infrastructure for known vulnerabilities or misconfigurations.
5. Summarize findings with severity, evidence, and references to assets or standards violated.
6. Translate mitigations into actionable backlog items. Align with release timelines.
7. Provide launch go/no-go recommendation and residual risk statement.
## Quality Gates
- No critical/high risks without documented mitigation and owner.
- Threat model reviewed against latest architecture diagram.
- Remediation backlog linked to acceptance criteria consumable by dev/test skills.
- Compliance requirements traced to controls or follow-up activities.
## Error Handling
- If findings rely on missing context, pause and obtain evidence before finalizing reports.
- Escalate systemic issues (e.g., absence of IAM, encryption gaps) to product leadership via orchestrator.
- Document assumptions; flag when runtime verification (DAST/SAST) is required beyond conversational review.
This skill performs structured security reviews to harden designs and implementations before release. It identifies threats, assesses gaps, prioritizes remediation, and produces actionable artifacts that teams can execute. The goal is to surface risks early, assign clear owners, and enable safe go/no-go decisions for launches and certifications.
I analyze architecture diagrams, data flows, deployment details, code references, and any existing test or audit reports to map trust boundaries and critical assets. I run threat modeling (STRIDE/LINDDUN), review dependencies and configurations, rate likelihood × impact, and produce a prioritized remediation backlog with owners and acceptance criteria. When context is incomplete, I schedule discovery steps and pause remediation until required evidence is available. Outputs include a threat model, gap assessment, remediation backlog, and optional compliance checklists.
What inputs do you need to start a review?
Current architecture diagrams, data flow descriptions, deployment environment, code or repo references, and any audit or test reports.
Can you produce fixes developers can implement directly?
Yes. I convert mitigations into prioritized user stories with acceptance criteria suitable for engineering execution.