home / skills / pluginagentmarketplace / custom-plugin-devops / security
This skill helps you implement DevSecOps by managing secrets, TLS, access, image scanning, and compliance across pipelines.
npx playbooks add skill pluginagentmarketplace/custom-plugin-devops --skill securityReview the files below or copy the command above to add this skill to your agents.
---
name: security
description: DevSecOps practices including secrets management, SSL/TLS, vulnerability scanning, and compliance
sasmp_version: "1.3.0"
bonded_agent: 07-cloud-infrastructure
bond_type: SECONDARY_BOND
---
# Security Skill
## MANDATORY
- Secrets management (Vault, AWS Secrets Manager)
- SSL/TLS certificate management
- SSH key management and hardening
- Container image scanning
- RBAC and access control
## OPTIONAL
- SAST/DAST security testing
- Compliance as Code (OPA, Rego)
- Network security and firewalls
- Identity management (IAM)
- Vulnerability management
## ADVANCED
- Zero-trust architecture
- Security automation and SOAR
- Penetration testing integration
- Incident response automation
- Security chaos engineering
## Assets
- See `assets/security-practices.yaml` for templates
This skill packages DevSecOps practices for CI/CD and infrastructure automation, focused on secrets, certificates, image scanning, and access control. It helps teams shift security left by integrating secrets management, SSL/TLS lifecycle, and container/image checks into deployment pipelines. The skill is designed for automation with shell-centric tooling and templates to enforce repeatable security controls.
The skill inspects repository and pipeline configurations to locate credentials, certificate usage, SSH keys, and container images. It automates checks and remediation steps: rotate or centralize secrets into vaults, validate and renew SSL/TLS certs, harden SSH configuration, and run container image vulnerability scans. It can also generate RBAC rules and link optional SAST/DAST, OPA policies, or incident automation hooks.
Does the skill store secrets for me?
No. It integrates and automates use of existing secret stores like Vault or AWS Secrets Manager rather than acting as a new secret repository.
Can it block deployments with critical vulnerabilities?
Yes. It supports pipeline gates that fail builds or prevent promotion when configured policies detect critical CVEs or failed security checks.