You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
"description": "Security-focused GitHub Copilot plugin marketplace for AppSec agents and the threat-model skill",
4
+
"description": "A collection of instructions and skills for application security tasks, including threat modeling, secure code review, and other appsec activities.",
5
5
"version": "1.0.0",
6
6
"pluginRoot": "./plugins"
7
7
},
@@ -10,10 +10,10 @@
10
10
},
11
11
"plugins": [
12
12
{
13
-
"name": "threat-model",
14
-
"description": "Performs threat modeling using Mermaid diagrams to validate flowcharts / sequence diagrams for security review",
13
+
"name": "copilot-security",
14
+
"description": "A plugin that provides application security skills and agents to help developers with threat modeling, secure code review, and other appsec tasks.",
-**AI hallucination protections** to prevent package spoofing, non-existent APIs, and misinformation risks.
23
23
-**Mentorship-style tips** to help newer engineers build secure coding habits.
24
24
-**Custom agents & Agent Skills** under `agents/` and `skills/` for repeatable AppSec workflows inside Copilot.
25
+
-**An installable GitHub Copilot CLI plugin** under `plugins/copilot-security` for reusable AppSec agents and skills across projects.
25
26
-**An MCP server** for seamless integration of these prompts into other projects.
26
27
27
28
---
@@ -37,7 +38,7 @@ It standardizes intake, then hands off to specialist agents (Analyst/Architect/E
37
38
38
39
| Prompt | Description | Intended Use |
39
40
| --- | --- | --- |
40
-
|[access-control-and-authorization-architecutre.prompt.md](prompts/access-control-and-authorization-architecture.prompt.md)| Review and report on access control / authorization architecture for project. | Perform analysis of the current architecture for access control and authorization within the project. |
41
+
|[access-control-review.prompt.md](prompts/access-control-review.prompt.md)| Review and report on access control / authorization architecture for project. | Perform analysis of the current architecture for access control and authorization within the project. |
41
42
|[assess-logging.prompt.md](prompts/assess-logging.prompt.md)| Identify unsafe logging and exposure of sensitive data. | Audit log output for leaks and recommend safer patterns. |
42
43
|[business-logic-review.prompt.md](prompts/business-logic-review.prompt.md)| Analyze overall business logic flow and decision making. | Map application behavior and critique critical logic paths. |
43
44
|[check-access-controls.prompt.md](prompts/check-access-controls.prompt.md)| Audit authorization and access control weaknesses. | Ensure RBAC/ABAC enforcement and consistent permission checks. |
@@ -68,39 +69,59 @@ It standardizes intake, then hands off to specialist agents (Analyst/Architect/E
|[authn-authz-review](skills/authn-authz-review/SKILL.md)| Review authentication and authorization controls. |
72
+
|[access-control-review](skills/access-control-review/SKILL.md)| Review identity, access control, and authorization architecture with evidence-first reporting. |
72
73
|[input-validation-hardening](skills/input-validation-hardening/SKILL.md)| Tighten validation boundaries and parsing safety. |
73
74
|[dependency-cve-triage](skills/dependency-cve-triage/SKILL.md)| CVE reachability + remediation plan workflow. |
74
75
|[secrets-and-logging-hygiene](skills/secrets-and-logging-hygiene/SKILL.md)| Prevent secret leaks and add redaction defaults. |
75
76
|[genai-acceptance-review](skills/genai-acceptance-review/SKILL.md)| Prevent over-trust and prompt/tool injection risks. |
76
77
|[threat-model](skills/threat-model/SKILL.md)| Full 4Q threat modeling workflow with CLI-friendly Mermaid docs and validation helpers. |
77
-
|[threat-model-lite](skills/threat-model-lite/SKILL.md)| Lightweight threat modeling with ranked mitigations. |
78
78
|[secure-fix-validation](skills/secure-fix-validation/SKILL.md)| Prove fixes work and don’t regress behavior. |
79
79
80
-
For GitHub Copilot CLI users, the `threat-model` skill bundles local Mermaid helper scripts so you can draft diagrams, print syntax guidance, and validate report files without the VS Code Mermaid Chart extension.
81
-
82
80
## 📦 How to Use in a Real Project
83
81
84
82
Tip for contributors: when adding a file under `prompts/`, update the Prompt Catalogue table.
85
83
86
-
### Leveraging Static Files
84
+
### Option 1: Leveraging Static Files
85
+
86
+
This option is best when you want to vendor a fixed set of guidance files directly into a repository instead of installing the reusable CLI plugin.
87
+
88
+
Copy the components you want from this repository into the matching `.github/` locations in your target project:
89
+
90
+
| From this repository | Copy into target project | Purpose |
91
+
| --- | --- | --- |
92
+
|`copilot-instructions.md`|`.github/copilot-instructions.md`| Repository-wide default coding and security guidance |
93
+
|`prompts/*.prompt.md`|`.github/prompts/`| Reusable prompt files that can be run directly in Copilot |
94
+
|`agents/*.agent.md`|`.github/agents/`| Reusable specialist agents such as analyst, architect, or engineer |
95
+
|`skills/**/SKILL.md` and skill-local files |`.github/skills/`| On-demand skills, including any helper scripts kept inside each skill directory |
96
+
|`instructions/*.instructions.md`|`.github/instructions/`| Path-specific instructions for matching file globs |
97
+
98
+
Notes:
99
+
100
+
- If you copy a skill directory, copy the entire folder, not just `SKILL.md`. Some skills include helper assets or scripts alongside the Markdown file.
101
+
- The root-level `instructions/` folder in this repository is currently empty, so there are no path-specific instruction files to copy right now.
102
+
- If you only need a subset, copy only the prompts, agents, or skills you plan to use.
103
+
104
+
1. Copy `copilot-instructions.md` into your repo under `.github/copilot-instructions.md`.
87
105
88
-
1. Copy the `copilot-instructions.md` file into your repo under:
89
-
`.github/copilot-instructions.md`
106
+
2. Copy whichever reusable folders and files you want to adopt:
90
107
91
-
2. Drop the prompts you want into:
92
-
`.github/prompts/`
108
+
- prompts into `.github/prompts/`
109
+
- agents into `.github/agents/`
110
+
- skills into `.github/skills/`
111
+
- instructions into `.github/instructions/` when this repository provides them
93
112
94
-
3. Open the prompt you wish to run within your IDE
113
+
3. Open the prompt or agent-enabled workflow you want to run within your IDE.
95
114
96
-
4.Click the `Run Prompt` button to the top-right of the file
115
+
4.For prompt files, click the `Run Prompt` button at the top-right of the file.
|`logger.transports.amqp.durable`| Whether the AMQP exchange is durable. |`false`|
144
165
145
166
3. Start the server
146
167
@@ -192,6 +213,88 @@ The MCP server simplifies the integration of secure coding prompts into your wor
192
213
193
214
**Example:**`Please get and run the secure code review prompt.`
194
215
216
+
### Option 3: Using the `copilot-security` GitHub Copilot CLI Plugin
217
+
218
+
This repository ships an installable GitHub Copilot CLI plugin named `copilot-security`.
219
+
220
+
Plugins are reusable bundles of Copilot components such as agents, skills, hooks, and integrations. In this project, the plugin is published from the official marketplace repository:
221
+
222
+
-`robotti-io/copilot-security-instructions`
223
+
224
+
The plugin manifest lives under `plugins/copilot-security/.github/plugin/plugin.json`, and the marketplace manifest for this repository lives under `.github/plugin/marketplace.json`.
225
+
226
+
#### What the plugin contains
227
+
228
+
The `copilot-security` plugin currently packages these reusable components:
229
+
230
+
- Agents:
231
+
-`application-security-analyst`
232
+
-`application-security-architect`
233
+
- Skills:
234
+
-`access-control-review`
235
+
-`dependency-cve-triage`
236
+
-`threat-model`
237
+
238
+
After installation, these agents and skills are available in any project where you use GitHub Copilot CLI.
-`robotti-io/copilot-security-instructions` is the marketplace repository reference you add.
259
+
-`copilot-security-instructions` is the marketplace name exposed by this repository's `marketplace.json`.
260
+
-`copilot-security` is the plugin name exposed by `plugins/copilot-security/.github/plugin/plugin.json`.
261
+
262
+
#### Install directly from the repository
263
+
264
+
If you do not want to register the marketplace first, you can install the plugin directly from this repository by pointing Copilot CLI at the plugin subdirectory:
Copy file name to clipboardExpand all lines: plugins/copilot-security/.github/plugin/plugin.json
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
{
2
-
"name": "threat-model",
3
-
"description": "Performs threat modeling using Mermaid diagrams to validate flowcharts / sequence diagrams for security review",
2
+
"name": "copilot-security",
3
+
"description": "A plugin that provides application security skills and agents to help developers with threat modeling, secure code review, and other appsec tasks.",
You are an **Application Security Analyst** embedded with a delivery team. Your job is to **find, explain, and prioritize security risks** in code and configurations, and to give **clear, developer-friendly guidance** for fixes.
9
+
10
+
## Operating principles
11
+
12
+
- Be **practical**: focus on issues that matter in real deployments and plausible threat models.
13
+
- Be **precise**: point to exact files, functions, lines, inputs/outputs, and trust boundaries.
14
+
- Be **actionable**: provide reproduction steps, impact, and recommended fixes.
15
+
- Be **conservative with scope**: you do **not** implement code changes. You may suggest diffs, but you must not edit files.
16
+
17
+
## Default workflow
18
+
19
+
1.**Clarify context (minimal):** identify component (API, web, worker), data sensitivity (PII, auth), environment (prod vs dev), and attacker model (external, internal, multi-tenant).
4.**Produce findings in a standard format** (below), ranked by risk and fix cost.
26
+
5.**Recommend next actions**: quick wins, tests, monitoring, and who should own the fix.
27
+
28
+
## Output format (use this exact structure)
29
+
30
+
### Summary
31
+
32
+
- What you reviewed
33
+
- Top risks (3–5 bullets)
34
+
- Overall risk rating: Low / Medium / High / Critical
35
+
36
+
### Findings
37
+
38
+
For each finding, include:
39
+
40
+
-**Title**
41
+
-**Severity** (Critical/High/Medium/Low) and **confidence** (High/Medium/Low)
42
+
-**Where** (file + function + relevant snippet description)
43
+
-**Risk** (what could happen, who can do it, required preconditions)
44
+
-**How to reproduce** (steps or a request example)
45
+
-**Recommendation** (specific fix guidance)
46
+
-**Verification** (how to test the fix)
47
+
48
+
### Notes
49
+
50
+
- Assumptions
51
+
- Out-of-scope items
52
+
- Follow-ups / questions for the team
53
+
54
+
## Repo-specific helpers (optional)
55
+
56
+
If the repository contains prompt files under `/prompts`, you may reference them by name (e.g., `secure-code-review.prompt.md`) and suggest the developer run them in Copilot.
0 commit comments