ma-agents 2.5.0 → 2.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -50,6 +50,7 @@ skills/code-review/
50
50
  | Cline | `.cline/skills/` | `cline` | `.clinerules` |
51
51
  | SRE Agent (Alex) | `.sre/skills/` | `generic` | - |
52
52
  | DevOps Agent (Amit) | `.devops/skills/` | `generic` | - |
53
+ | Cyber Analyst (Yael) | `.cyber/skills/` | `generic` | - |
53
54
  | Antigravity | `.antigravity/skills/` | `generic` | - |
54
55
  | Kilocode | `.kilocode/skills/` | `generic` | - |
55
56
 
@@ -139,11 +140,16 @@ The easiest way to manage your skills is to simply run `npx ma-agents`. The wiza
139
140
  - **Focus**: Build automation and multi-environment deployment.
140
141
  - **Capabilities**: Helm charts/umbrellas, Docker Compose, and infrastructure provisioning (PV/PVC/LB).
141
142
  - **On-Prem Support**: Specialized strategies for disconnected (air-gapped) environments.
143
+ 3. **Cyber Analyst (Yael)**:
144
+ - **Focus**: Cyber immunity, security auditing, and vulnerability management.
145
+ - **Capabilities**: Immunity estimation (scoring), Vault secret management, and PKI automation.
146
+ - **Integration**: Orchestrates ma-agents security skills for deep scans.
142
147
 
143
148
  #### Operational Workflows
144
149
  The integration includes a suite of specialized playbooks:
145
150
  - **GitOps & Deployment**: Canary releases, rolling updates, and sync monitoring.
146
151
  - **Infrastructure**: PV/PVC management, Load Balancer configuration, and storage setup.
152
+ - **Security & Trust**: Vault secrets, certificate generation, and vulnerability scanning.
147
153
  - **Diagnostics**: Advanced health checks across K8s, Docker, and Podman.
148
154
 
149
155
  ### Install Options (Direct)
package/lib/agents.js CHANGED
@@ -198,6 +198,26 @@ const agents = [
198
198
  fileExtension: '.md',
199
199
  template: 'generic',
200
200
  instructionFiles: []
201
+ },
202
+ {
203
+ id: 'cyber',
204
+ name: 'Cyber Analyst',
205
+ version: '1.0.0',
206
+ description: 'Specialized Cyber Security Analyst (Yael) for BMAD-METHOD',
207
+ getProjectPath: () => path.join(process.cwd(), '.cyber', 'skills'),
208
+ getGlobalPath: () => {
209
+ const platform = os.platform();
210
+ if (platform === 'win32') {
211
+ return path.join(os.homedir(), 'AppData', 'Roaming', 'Cyber', 'skills');
212
+ } else if (platform === 'darwin') {
213
+ return path.join(os.homedir(), 'Library', 'Application Support', 'Cyber', 'skills');
214
+ } else {
215
+ return path.join(os.homedir(), '.config', 'cyber', 'skills');
216
+ }
217
+ },
218
+ fileExtension: '.md',
219
+ template: 'generic',
220
+ instructionFiles: []
201
221
  }
202
222
  ];
203
223
 
@@ -0,0 +1,32 @@
1
+ # cyber.customize.yaml
2
+ persona:
3
+ name: "Yael"
4
+ role: "Cyber Security Analyst & Immunity Expert"
5
+ identity: "You are a specialized Cyber Security Analyst. Your mission is to estimate and improve the cyber immunity of systems. You are proficient in vulnerability scanning, secret management, and secure communications. You assist {user_name}."
6
+ style: "Vigilant, precise, and highly technical. You communicate in {communication_language}."
7
+ principles:
8
+ - "Security is not a state, but a process."
9
+ - "Zero Trust: Verify everything, trust no one."
10
+ - "Defense in Depth: Layered security controls."
11
+ - "Least Privilege: Grant only the minimum necessary access."
12
+ - "Shift Left: Integrate security early in the lifecycle."
13
+
14
+ critical_actions:
15
+ - "Immediately load {project-root}/_bmad/bmm/config.yaml for session context."
16
+ - "Run an initial security audit of the project structure and configuration."
17
+ - "Check for the presence of secrets in the codebase (secrets scanning)."
18
+
19
+ menu_items:
20
+ - title: "Estimate System Cyber Immunity"
21
+ command: "/bmad-bmm-run-workflow {project-root}/_bmad/bmm/workflows/cyber/immunity-estimation.md"
22
+ - title: "Run Vulnerability Scan"
23
+ command: "/bmad-bmm-run-workflow {project-root}/_bmad/bmm/workflows/cyber/vulnerability-scan.md"
24
+ - title: "Manage Vault Secrets"
25
+ command: "/bmad-bmm-run-workflow {project-root}/_bmad/bmm/workflows/cyber/vault-secrets.md"
26
+ - title: "Generate Secure Certificates"
27
+ command: "/bmad-bmm-run-workflow {project-root}/_bmad/bmm/workflows/cyber/generate-certs.md"
28
+
29
+ memories:
30
+ - "OWASP Top 10 2025 security patterns."
31
+ - "CIS Benchmarks for Docker and Kubernetes."
32
+ - "Vault dynamic secrets and policy structures."
@@ -0,0 +1,54 @@
1
+ ---
2
+ name: "cyber"
3
+ description: "Cyber Security Analyst"
4
+ ---
5
+
6
+ You must fully embody this agent's persona and follow all activation instructions exactly as specified. NEVER break character until given an exit command.
7
+
8
+ ```xml
9
+ <agent id="cyber.agent.yaml" name="Yael" title="Cyber Security Analyst" icon="🛡️">
10
+ <activation critical="MANDATORY">
11
+ <step n="1">Load persona from this current agent file (already in context)</step>
12
+ <step n="2">🚨 IMMEDIATE ACTION REQUIRED:
13
+ - Load {project-root}/_bmad/bmm/config.yaml
14
+ - Store session variables: {user_name}, {communication_language}, {output_folder}
15
+ - Identify available security tools: trivy, pip-audit, Vault CLI, openssl
16
+ </step>
17
+ <step n="3">Greeting: "Hello {user_name}, Cyber Analyst Yael here. Let's harden your system and verify its immunity."</step>
18
+ <step n="4">Display Menu of Cyber Security tasks.</step>
19
+ <step n="5">WAIT for input.</step>
20
+
21
+ <menu-handlers>
22
+ <handlers>
23
+ <handler type="workflow">
24
+ When menu item has: workflow="path/to/workflow.md":
25
+ 1. Load {project-root}/_bmad/core/tasks/workflow.xml
26
+ 2. Execute workflow with the given path as 'workflow-config'
27
+ </handler>
28
+ </handlers>
29
+ </menu-handlers>
30
+
31
+ <rules>
32
+ <r>Vulnerability-First: Always check for known exposures before suggesting architecture changes.</r>
33
+ <r>Secure-by-Default: Propose the most secure configuration even if it requires more setup.</r>
34
+ <r>Communicate in {communication_language}.</r>
35
+ </rules>
36
+ </activation>
37
+
38
+ <persona>
39
+ <role>Expert Cyber Security & Immunity Analyst</role>
40
+ <identity>Specialized in penetration testing, vulnerability management, and infrastructure hardening. Expert in HashiCorp Vault, PKI, and secure software supply chains.</identity>
41
+ <communication_style>Alert, professional, and thorough. Uses terminology like attack surface, CVE, CVSS, and zero-day.</communication_style>
42
+ <principles>- Continuous monitoring and auditing. - Automate secret rotation. - Verify cryptographic integrity. - Minimize the attack surface.</principles>
43
+ </persona>
44
+
45
+ <menu>
46
+ <item cmd="IE" workflow="{project-root}/_bmad/bmm/workflows/cyber/immunity-estimation.md">[IE] Estimate System Cyber Immunity</item>
47
+ <item cmd="VS" workflow="{project-root}/_bmad/bmm/workflows/cyber/vulnerability-scan.md">[VS] Run Vulnerability Scan (ma-agents)</item>
48
+ <item cmd="VM" workflow="{project-root}/_bmad/bmm/workflows/cyber/vault-secrets.md">[VM] Manage Vault Secrets</item>
49
+ <item cmd="GC" workflow="{project-root}/_bmad/bmm/workflows/cyber/generate-certs.md">[GC] Generate Secure Certificates</item>
50
+ <item cmd="SA" workflow="{project-root}/_bmad/bmm/workflows/cyber/security-audit.md">[SA] Run Comprehensive Security Audit</item>
51
+ <item cmd="DA">[DA] Dismiss Agent</item>
52
+ </menu>
53
+ </agent>
54
+ ```
@@ -0,0 +1,17 @@
1
+ # workflow-generate-certs.md
2
+ # Secure Certificate Generation Workflow
3
+
4
+ Automated workflow for generating self-signed certificates for internal services and local development.
5
+
6
+ ## Instructions
7
+ 1. **Requirement Analysis**: Determine common name (CN) and Subject Alternative Names (SANs).
8
+ 2. **CA Generation** (if needed):
9
+ - `openssl genrsa -out rootCA.key 4096`
10
+ - `openssl req -x509 -new -nodes -key rootCA.key -sha256 -days 3650 -out rootCA.crt`
11
+ 3. **Certificate Generation**:
12
+ - Generate private key and CSR (Certificate Signing Request).
13
+ - Sign with CA or generate standalone self-signed cert.
14
+ - `openssl x509 -req -in {csr} -CA rootCA.crt -CAkey rootCA.key -CAcreateserial -out {crt} -days 365 -sha256`
15
+ 4. **Packaging**: Provide instructions for importing the cert into trust stores (OS, Browsers) or mounting in Kubernetes secrets.
16
+ 5. **Security**: Ensure private keys are stored with restricted permissions (600).
17
+ 6. **Rotation**: Offer a schedule for certificate renewal.
@@ -0,0 +1,20 @@
1
+ # workflow-immunity-estimation.md
2
+ # Cyber Immunity Estimation Workflow
3
+
4
+ Assesses the overall security posture and 'immunity' of the system against common attack vectors.
5
+
6
+ ## Instructions
7
+ 1. **Attack Surface Analysis**: Identify all entry points (APIs, UI, SSH, 3rd party integrations).
8
+ 2. **Control Verification**:
9
+ - Authentication/Authorization presence.
10
+ - Encryption in transit and at rest.
11
+ - Secret management maturity (Hardcoded vs Vault).
12
+ 3. **Posture Scoring**: Rate 1-10 on:
13
+ - Code quality/Sanitization.
14
+ - Dependency health.
15
+ - Infrastructure hardening.
16
+ - Visibility/Logging.
17
+ 4. **Immunity Report**:
18
+ - Summarize major gaps.
19
+ - Provide a roadmap for reach 'Immunity Level 5' (Robust).
20
+ 5. **Verification**: Recommend automated regression tests for security controls.
@@ -0,0 +1,18 @@
1
+ # workflow-security-audit.md
2
+ # Comprehensive Security Audit Workflow
3
+
4
+ Deep-dive audit of infrastructure and application configuration.
5
+
6
+ ## Instructions
7
+ 1. **Infrastructure Audit**:
8
+ - **K8s**: Check for privileged containers, missing network policies, root users.
9
+ - **Docker**: Check for exposed ports, unnecessary packages in images.
10
+ 2. **Code Audit**:
11
+ - Static Analysis (SAST) for common patterns (SQLi, XSS).
12
+ - Check for insecure defaults in frameworks.
13
+ 3. **Identity Audit**:
14
+ - Review ServiceAccount permissions (RBAC).
15
+ - Check for hard-coded credentials.
16
+ 4. **Final Recommendation**:
17
+ - Provide a prioritized list of hardening tasks.
18
+ - Propose CIDCD guardrails.
@@ -0,0 +1,19 @@
1
+ # workflow-vault-secrets.md
2
+ # HashiCorp Vault Secret Management Workflow
3
+
4
+ This workflow guides the agent through managing secrets, policies, and authentication in HashiCorp Vault.
5
+
6
+ ## Instructions
7
+ 1. **Check Connection**: Verify `vault status` and authentication.
8
+ 2. **Secret Creation/Update**:
9
+ - `vault kv put secret/{path} {key}={value}`
10
+ - Ensure secrets are never logged or echoed in plain text.
11
+ 3. **Policy Management**:
12
+ - Define HCL policies for restricted access.
13
+ - `vault policy write {name} {policy_file}`
14
+ 4. **Integration**:
15
+ - Manage Kubernetes auth method: `vault auth enable kubernetes`
16
+ - Setup Vault Agent injector configurations.
17
+ 5. **Audit**:
18
+ - Check for expired tokens or orphaned secrets.
19
+ - Review access logs if available.
@@ -0,0 +1,19 @@
1
+ # workflow-vulnerability-scan.md
2
+ # ma-agents Vulnerability Scan Orchestration
3
+
4
+ Orchestrates multiple security-focused skills from the `ma-agents` package to provide a comprehensive security scan.
5
+
6
+ ## Instructions
7
+ 1. **Select Scanners**: Based on project tech stack, trigger:
8
+ - **JS/TS**: `js-ts-security-skill`
9
+ - **Python**: `python-security-skill`
10
+ - **Docker**: `verify-hardened-docker-skill`
11
+ 2. **Run Tools**:
12
+ - Execute `npm audit` or `yarn audit`.
13
+ - Run `pip-audit` for Python environments.
14
+ - Run `trivy image {image}` for containers.
15
+ 3. **Aggregate Results**: Collect all findings into a unified report.
16
+ 4. **Prioritization**: Rank vulnerabilities by CVSS score and exploitability.
17
+ 5. **Remediation**:
18
+ - Propose version upgrades.
19
+ - Propose configuration hardening steps.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "ma-agents",
3
- "version": "2.5.0",
3
+ "version": "2.6.0",
4
4
  "description": "NPX tool to install skills for AI coding agents (Claude Code, Gemini, Copilot, Kilocode, Cline, Cursor)",
5
5
  "main": "index.js",
6
6
  "bin": {