secure-sdlc-agents
Health Warn
- License — License: MIT
- Description — Repository has a description
- Active repo — Last push 0 days ago
- Low visibility — Only 5 GitHub stars
Code Pass
- Code scan — Scanned 12 files during light audit, no dangerous patterns found
Permissions Pass
- Permissions — No dangerous permissions requested
This tool provides a team of eight specialized AI sub-agents designed to integrate into your development workflow. They enforce security best practices across the entire software development lifecycle, from threat modeling and code review to infrastructure checks and release sign-off.
Security Assessment
Overall risk: Low. The light code audit scanned 12 files and found no dangerous patterns, hardcoded secrets, or requests for excessive permissions. As an orchestration layer for AI agents, it inherently relies on executing commands and interacting with your local codebase to perform security analysis. However, the tool itself does not appear to make unauthorized external network requests or exfiltrate sensitive data. The risk profile is limited to the standard trust you must place in any CLI tool that reads your source code.
Quality Assessment
The project is actively maintained, with its most recent push happening today. It uses the standard, permissive MIT license, making it suitable for most projects. The primary concern is its extremely low community visibility. Currently sitting at only 5 GitHub stars, the tool has not been widely peer-reviewed or battle-tested by the broader developer community. The documentation is robust and clearly outlines its methodology, but the lack of community adoption means you are largely relying on the creator's expertise.
Verdict
Use with caution — the code itself appears safe and well-intentioned, but the lack of community adoption means it has not yet been broadly validated or peer-reviewed.
A team of Claude Code sub-agents that enforce security across the full SDLC, from ASVS requirements and threat modelling to SAST triage, IaC review, compliance attestation and release sign-off. Drop into any project. No security team required.
Secure SDLC Agents
8 AI security specialists. Invoked at the exact phase where each vulnerability would have been caught.
Requirements → threat modelling → code review → IaC → compliance → release gate.
Works in Claude Code, Cursor, Windsurf, Warp, and any MCP-compatible tool.
The 4-Minute Problem
You asked Claude Code to build a file upload feature. It wrote working code in 4 minutes.
It missed:
| Vulnerability | Severity | Which agent catches it |
|---|---|---|
SVG file with embedded <script> stored and served without sanitisation |
CRITICAL | appsec-engineer — MIME type validation, output encoding |
| No file size limit or type allowlist | HIGH | appsec-engineer — input validation, magic byte checks |
S3 bucket provisioned with public-read ACL |
CRITICAL | cloud-platform-engineer — IaC security review |
| No rate limiting on the upload endpoint | HIGH | appsec-engineer — anti-automation controls |
| Upload URL in API response leaks internal bucket path | MEDIUM | dev-lead — information disclosure review |
Every one of these has appeared in real breach post-mortems. AI agents optimise for working code, not secure code. This project embeds the specialists that close that gap — at the exact phase where each issue would have been caught.
What you get
| What | Why it matters |
|---|---|
| 8 specialist agents | AppSec, Product Manager, GRC Analyst, Cloud/Platform, Dev Lead, Release Manager, Security Champion, AI Security Engineer |
| MCP server | Works in Cursor, Windsurf, Zed, Continue, and any MCP-compatible tool |
CLI tool (secure-sdlc) |
Zero-friction setup, kickoff wizard, status dashboard, release gate |
| Cursor rules | Automatic security context in every Cursor session |
| GitHub Actions workflow | Artefact gate, secret scan, SAST (CodeQL), IaC scan (Checkov), dependency audit |
| Git hooks | Pre-commit secret detection, security anti-pattern checks |
| Warp workflows | Pre-built Warp automation for every SDLC phase |
| Stack profiles | Deep, framework-specific guidance for Next.js, FastAPI, Django, Express, Rails |
| Document templates | 8 fully structured templates for every phase artefact |
| Worked examples | 3 complete feature walkthroughs (auth, REST API, file upload) |
Agents
| Agent | Role | When to invoke |
|---|---|---|
product-manager |
ASVS-mapped security requirements | Start of every feature |
appsec-engineer |
Threat modelling, SAST/DAST, vuln triage | Design, Build, Test |
grc-analyst |
Compliance mapping, risk register, audit evidence | Plan through Release |
cloud-platform-engineer |
IaC security, CSPM, secrets, hardening | Design, Build, Release |
dev-lead |
Secure coding, PR review, SCA | Every PR |
release-manager |
Security sign-off, go/no-go gate | Pre-release |
security-champion |
First-line security Q&A and lightweight review | Any time, any phase |
ai-security-engineer |
Prompt injection, agentic risks, LLM supply chain | Any feature using AI/LLMs |
Who Do You Call?
What are you working on?
│
├── Starting a new feature?
│ ├── product-manager → "Define security requirements for X using ASVS L2"
│ └── grc-analyst → "Initialise risk register, map to SOC2 / GDPR / PCI-DSS"
│
├── Designing the architecture?
│ ├── appsec-engineer → "Threat model this design using STRIDE"
│ ├── cloud-platform-engineer → "Review IaC for this feature"
│ └── ai-security-engineer → "Security review — feature calls an LLM" ← always include this
│
├── Writing or merging code?
│ ├── dev-lead → "Review PR #N for secure coding issues and dependency risks"
│ └── appsec-engineer → "Triage SAST findings for PR #N"
│
├── Quick security question (any phase)?
│ └── security-champion → "Is this pattern / library safe? Context: ..."
│
└── Ready to ship?
└── release-manager → "Run pre-release security checklist for vX.Y.Z"
Quick start
Option 0 — Claude Code Plugin Marketplace
/plugin marketplace add Kaademos/secure-sdlc-agents
/plugin install secure-sdlc-agents@secure-sdlc-agents
All 8 agents are immediately available in your session. No cloning, no npm, no file copying.
Option A — Git clone (zero dependencies)
git clone https://github.com/Kaademos/secure-sdlc-agents.git
cp -r secure-sdlc-agents/.claude /your/project/
cp secure-sdlc-agents/CLAUDE.md /your/project/
cp -r secure-sdlc-agents/docs/templates /your/project/docs/
Then use agents directly:
cd /your/project
claude --agent product-manager "Define security requirements for [your feature]"
Option B — CLI tool (recommended for teams)
Published on npm as @kaademos/secure-sdlc. Requires Node.js 18+.
Global install (command is still secure-sdlc):
npm install -g @kaademos/secure-sdlc
secure-sdlc --version
secure-sdlc init
No global install (uses npx; pin a version in CI with @1.0.0):
npx @kaademos/secure-sdlc@latest init
After install — useful commands:
secure-sdlc paths # print PACKAGE_ROOT and MCP server path (for Cursor MCP JSON)
secure-sdlc init --cursor # scaffold project + .cursor/mcp.json pointing at bundled MCP
secure-sdlc install-mcp # merge MCP server into ~/.cursor/mcp.json (and other tools)
secure-sdlc kickoff # interactive feature wizard
secure-sdlc status
Develop / run from a git clone (no npm publish needed):
cd /path/to/secure-sdlc-agents
npm install
node cli/bin/secure-sdlc.js init
# or: npm run sdlc -- init
Option C — Cursor / Windsurf / Other MCP tools
- Get the absolute path to
mcp/src/server.js:
- If you installed the CLI from npm: run
secure-sdlc pathsand copyMCP_SERVER. - If you use a git clone: run
npm installat the repo root (installs MCP SDK for the bundled server), then use/absolute/path/to/secure-sdlc-agents/mcp/src/server.js.
- Add to your MCP config:
Cursor (~/.cursor/mcp.json or .cursor/mcp.json in project):
{
"mcpServers": {
"secure-sdlc": {
"command": "node",
"args": ["/absolute/path/from-secure-sdlc-paths/mcp/src/server.js"]
}
}
}
Claude Code:
claude mcp add secure-sdlc -- node /absolute/path/to/secure-sdlc-agents/mcp/src/server.js
Or install for all tools at once:
node cli/bin/secure-sdlc.js install-mcp --tool all
- Copy the Cursor rules for automatic security context:
cp -r .cursor /your/project/
- Use the
sdlc_*tools in any chat:
Use sdlc_plan_feature to define security requirements for a new payment checkout feature.
Stack is Next.js + Stripe + PostgreSQL. ASVS L2. Compliance: PCI-DSS, SOC2.
The lifecycle — phase by phase
PLAN product-manager (ASVS requirements)
+ grc-analyst (risk register, compliance mapping)
↓
DESIGN appsec-engineer (STRIDE threat model)
+ cloud-platform-engineer (IaC review)
+ ai-security-engineer (if AI/LLM features)
+ grc-analyst (compliance gate)
↓
BUILD dev-lead (PR review, SCA) — on every PR
+ appsec-engineer (SAST triage)
+ cloud-platform-engineer (secrets, pipeline)
+ security-champion (quick questions any time)
↓
TEST appsec-engineer (DAST, pentest)
+ dev-lead (regression)
+ grc-analyst (audit evidence collection)
↓
RELEASE release-manager (go/no-go)
+ grc-analyst (compliance attestation)
+ cloud-platform-engineer (production hardening)
Severity gates:
- CRITICAL — blocks all gates, no exceptions
- HIGH — blocks Build→Test and Test→Release without documented accepted risk
- MEDIUM — requires remediation plan or accepted risk before release
- LOW — tracked in risk register, does not block
Frequently Asked Questions
Q: Where do I put my OpenAI or Anthropic API key?
You don't need to provide an API key to secure-sdlc. This project does not make LLM API calls directly. Instead, it acts as an MCP server and prompt-generation engine that feeds specialized security context to your "host" AI tool (Cursor, Windsurf, Claude Code). Your API keys and billing are handled entirely by your host application.
Q: Do I have to manually fill out the Markdown templates?
No. While the project provides structured templates in docs/templates/, you do not fill them out by hand. When you invoke a tool like sdlc_plan_feature, the MCP server passes the blank template to your AI assistant, and the AI automatically writes the completed, project-specific markdown file directly to your docs/ folder.
Q: Do the AI agents run automatically in my CI/CD pipeline?
No, the AI agents are designed to be used locally by developers during the coding process (e.g., in your IDE or terminal). The provided GitHub Actions workflow (secure-sdlc-gate.yml) does not invoke LLMs. Instead, it acts as a deterministic gatekeeper—it runs traditional tools (like Gitleaks, Checkov, CodeQL) and verifies that the AI-generated artifacts actually exist and are fully filled out before allowing a merge.
Q: Will this use a lot of API tokens/credits?
Because this tool feeds comprehensive security frameworks (like OWASP ASVS), infrastructure checklists, and full file templates into your AI's context window, it can consume a significant number of tokens. Ensure your host application (like Claude Code or your Cursor subscription) has sufficient limits for handling large context prompts.
Q: Can I customize the templates for my own company's requirements?
Yes. When you run secure-sdlc init, the default templates are copied into your local docs/templates/ directory. You can modify these markdown files to include your own company's specific compliance headers, and the agents will use your customized versions going forward.
MCP tools reference
When using the MCP server (Cursor, Windsurf, etc.), these tools are available:
| Tool | What it does |
|---|---|
sdlc_plan_feature |
ASVS requirements + risk register for a new feature |
sdlc_threat_model |
STRIDE (+ LINDDUN) threat model |
sdlc_review_pr |
Security review a PR — dev-lead + appsec-engineer |
sdlc_review_infra |
IaC security review (Terraform, Helm, K8s, etc.) |
sdlc_triage_sast |
Triage SAST findings from any tool |
sdlc_release_gate |
Pre-release go/no-go security gate |
sdlc_check_compliance |
Map controls to SOC 2, ISO 27001, GDPR, PCI DSS, etc. |
sdlc_init_project |
Scaffold Secure SDLC structure in a project |
sdlc_security_champion |
Quick security Q&A and lightweight code review |
sdlc_ai_security_review |
Security review for AI/LLM features |
CLI commands reference
secure-sdlc init # Scaffold docs, hooks, CI, config in current project
secure-sdlc init --cursor # Also install Cursor MCP config and rules
secure-sdlc kickoff # Interactive wizard to start a new feature
secure-sdlc status # Show current SDLC phase and artefact status
secure-sdlc review # Security review a file or diff
secure-sdlc gate v1.2.0 # Run pre-release security gate check
secure-sdlc install-mcp # Install MCP server for Cursor / Claude Code / Windsurf
secure-sdlc paths # Show package root + MCP path (after npm install -g)
Git hooks
Included in hooks/:
pre-commit— secret detection, lock file checks, security anti-pattern scanpre-push— artefact gate for protected branches, open finding check
Install:
bash /path/to/secure-sdlc-agents/hooks/install.sh
# OR via CLI:
secure-sdlc init # installs hooks automatically
GitHub Actions
.github/workflows/secure-sdlc-gate.yml adds:
- Artefact gate — blocks PRs to main/master if required security docs are missing
- Secret scanning (Gitleaks)
- Dependency audit (npm audit, pip-audit)
- IaC scanning (Checkov — Terraform, K8s, Docker)
- SAST (CodeQL — JavaScript/TypeScript, Python)
- Release gate — full pre-release checklist on
workflow_dispatch
Copy to your project:
mkdir -p .github/workflows
cp /path/to/secure-sdlc-agents/.github/workflows/secure-sdlc-gate.yml .github/workflows/
Stack profiles
Deep, framework-specific security guidance in stacks/:
| Stack | Profile |
|---|---|
| Next.js | stacks/nextjs.md — Server Actions, API routes, CSP, CORS |
| FastAPI | stacks/fastapi.md — Depends() auth, Pydantic, CORS, rate limiting |
| Django | stacks/django.md — CSRF, strong params, ORM injection, production settings |
| Express.js | stacks/express.md — helmet, rate limiting, CSRF, Zod validation |
| Ruby on Rails | stacks/rails.md — Brakeman, Pundit, strong parameters, credentials |
Warp terminal workflows
In warp-workflows/ — import into Warp for one-click SDLC automation:
| Workflow | Trigger |
|---|---|
| Feature Kickoff | Start a new feature with requirements + risk register |
| PR Security Review | dev-lead + appsec review on a PR |
| Threat Model | STRIDE threat model on an architecture |
| Release Gate | Full pre-release security gate |
| SDLC Status | Check which phases are complete |
Document templates
docs/templates/ contains pre-formatted templates for every artefact:
| Template | Produced by | Phase |
|---|---|---|
security-requirements.md |
product-manager | Plan |
risk-register.md |
grc-analyst | Plan → ongoing |
threat-model.md |
appsec-engineer | Design |
infra-security-review.md |
cloud-platform-engineer | Design |
sast-findings.md |
appsec-engineer + dev-lead | Build |
test-security-report.md |
appsec-engineer | Test |
release-sign-off.md |
release-manager | Release |
compliance-attestation.md |
grc-analyst | Release |
Worked examples
| Example | Feature type | Key security lessons |
|---|---|---|
01-login-feature/ |
Auth flow (bcrypt, MFA, sessions) | JWT alg:none, hardcoded secrets, cost factor |
02-api-endpoint/ |
Public REST API | IDOR via UUID path param, IAM over-privilege |
03-file-upload/ |
File upload to S3 | SVG XSS, magic byte validation, public bucket |
Project configuration
Create secure-sdlc.yaml in your project root:
project:
name: "my-app"
stack: "Next.js + PostgreSQL"
security:
asvs_level: L2
frameworks: [SOC2, GDPR]
gates:
build_to_test:
block_on: [CRITICAL, HIGH]
test_to_release:
block_on: [CRITICAL, HIGH]
Generate one automatically: secure-sdlc init
A note on what these agents are — and aren't
These agents produce guidance, not guarantees.
They will help a team ask the right questions earlier, produce consistent artefacts,
and catch common mistakes that would otherwise slip through. They will not replace a
skilled AppSec engineer, a qualified GRC practitioner, or a thorough penetration test.
Every output should be reviewed by a human with relevant expertise before it is acted on
or used as audit evidence. The threat model is a starting point, not a final document.
Security practitioners are right to be sceptical of anything that claims to automate
security away. This project does not make that claim. It makes security practices easier
to start, easier to maintain, and harder to skip — which is most of the battle.
If you find guidance in an agent file that is wrong or dangerously out of date,
please open an issue.
Prerequisites
- Claude Code for sub-agent usage
- Node.js 18+ for the CLI and MCP server
- Optional:
npm install -g @kaademos/secure-sdlcfor thesecure-sdlccommand on your PATH - Any MCP-compatible AI tool for the
sdlc_*tools
Contributing
See CONTRIBUTING.md. High-value contributions:
- Additional compliance frameworks (HIPAA, FedRAMP, NIS2)
- Stack profiles for Go (Gin/Echo), .NET, Java Spring Boot
- More worked examples (OAuth flows, payment processing, AI features)
- Integration guides for specific SAST/DAST tools
- Translations of agent prompts
Related
- OWASP ASVS
- OWASP Top 10
- OWASP Top 10 for LLMs 2025
- NIST SSDF
- Model Context Protocol
- Claude Code documentation
Licence
MIT — see LICENSE.
Reviews (0)
Sign in to leave a review.
Leave a reviewNo results found