npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

agent-security-policies

v1.4.2

Published

Portable, standards-backed security policies for any AI coding agent. One command to install OWASP, CWE, NIST rules + security skills.

Downloads

295

Readme

agent-security-policies

License: Apache 2.0 Version OWASP ASVS CWE Top 25

Portable, standards-backed security policies for any AI coding agent.

AI coding agents generate code fast — but without guardrails, they also generate vulnerabilities fast. This project provides a drop-in security policy layer that works with 10+ agents and IDEs, backed by OWASP, NIST, CWE, and SLSA standards.

One install command. Zero dependencies. Every agent speaks security.


Table of Contents


Quick Install

One command — zero dependencies. Copies AGENT_RULES.md + policies/ + skills/ and generates the config file your agent auto-detects.

npx (Cross-platform — recommended)

# All agents + security skills
npx agent-security-policies --all

# Interactive mode — guided setup
npx agent-security-policies

# Specific agents only
npx agent-security-policies --agent copilot,claude --skills

# Local-only setup (files gitignored, each dev runs npx after clone)
npx agent-security-policies --all --gitignore

# List available agents, profiles, and skills
npx agent-security-policies --list

Linux / macOS

# All agents + security skills (Copilot, Codex CLI, Claude CLI, Antigravity)
curl -sSL https://raw.githubusercontent.com/raomaster/agent-security-policies/main/install.sh | bash -s -- --all

# Specific agents only
curl -sSL https://raw.githubusercontent.com/raomaster/agent-security-policies/main/install.sh | bash -s -- --agent copilot,claude

Windows (PowerShell)

# All agents + security skills
irm https://raw.githubusercontent.com/raomaster/agent-security-policies/main/install.ps1 | iex

# Or download and run with options
Invoke-WebRequest -Uri https://raw.githubusercontent.com/raomaster/agent-security-policies/main/install.ps1 -OutFile install.ps1
.\install.ps1 -Agent copilot,codex,claude,antigravity

From local clone

git clone https://github.com/raomaster/agent-security-policies.git
cd agent-security-policies
./install.sh --all --target /path/to/your/project

--all installs both agent configs and the full security skills pack. Use --agent ... without --skills for rules-only setup.

What gets generated

| Agent | File created | Auto-detected by | |-------|-------------|------------------| | GitHub Copilot | .github/copilot-instructions.md | VS Code + JetBrains | | Codex CLI | AGENTS.md | Codex CLI (OpenAI) | | Claude CLI | CLAUDE.md | Claude Code (Anthropic) | | Antigravity | .agent/rules/security.md | Gemini (Google) |

All files reference AGENT_RULES.md with key rules inline. Non-destructive — existing files are never overwritten; security rules are appended with your confirmation.


Contents

.
├── AGENT_RULES.md              ← Main system prompt (feed this to your agent)
├── AGENT_RULES_LITE.md         ← Compact profile (~1K tokens) for local LLMs
├── README.md                   ← Setup instructions (you are here)
├── policies/                   ← YAML security policies (11 domains, OWASP, NIST)
│   ├── base_policy.yaml        ← 11 security domains (always active)
│   ├── owasp_asvs.yaml         ← ASVS 5.0.0 checklist (V1-V17)
│   ├── owasp_masvs.yaml        ← MASVS 2.1.0 controls (mobile only)
│   ├── cwe_top25.yaml          ← 25 CWE/SANS 2025 prevention rules
│   └── llm_security.yaml       ← OWASP LLM Top 10 2025 controls
└── skills/                     ← 🚀 Executable Agent Security Skills
    ├── sast-scan/              ← Code vulnerabilities via Semgrep
    ├── secrets-scan/           ← Hardcoded credentials via Gitleaks
    ├── dependency-scan/        ← Known CVEs via Trivy
    ├── container-scan/         ← Container image scanning via Trivy
    ├── iac-scan/               ← Infrastructure as Code via Trivy
    ├── threat-model/           ← STRIDE threat modeling
    └── fix-findings/           ← Automated remediation from scan outputs

🚀 Agent Security Skills (NEW in v1.3)

agent-security-policies ships with an extensible framework of Security Skills — atomic, zero-dependency actions that your AI agent can execute to proactively locate and fix security vulnerabilities.

| Skill | Tool | Output | |-------|------|--------| | sast-scan | Semgrep | CWE-mapped code vulnerabilities (JSON) | | secrets-scan | Gitleaks | Hardcoded secrets and credentials (JSON) | | dependency-scan | Trivy | Known CVEs in packages (JSON) | | container-scan | Trivy | Container image misconfigurations (JSON) | | iac-scan | Trivy | Terraform / Helm / K8s issues (JSON) | | threat-model | Agent | STRIDE threat model (Markdown) | | fix-findings | Agent | Automated fixes from any scan output |

Skills chain together: sast-scanfix-findings, dependency-scanfix-findings.

Want your agent to learn a new trick? See the Skills Design and Creation Guide.


Delivery Options

  1. Canonical repo-root (recommended)
    • Keep AGENT_RULES.md and policies/ at project root.
    • Lowest maintenance, easiest for CI and contributors.
  2. Shared monorepo policy
    • Keep a single policy set at monorepo root and reference it from each service.
    • Best when all teams must enforce the same baseline.
  3. Per-service policy
    • Each service owns its own AGENT_RULES.md and policies/.
    • Best when risk profiles differ (for example, payments vs frontend).

Enforcement Levels

After installing, you can tune how strictly your agent enforces the rules by adding one of these snippets to your agent's instructions. This is independent of --profile (which controls file size / token budget).

Minimal

Read and follow AGENT_RULES.md for secure coding basics.
Use policies/base_policy.yaml as mandatory baseline.

Standard (default behavior — no extra instructions needed)

Read and follow AGENT_RULES.md.
Apply policies/base_policy.yaml + policies/owasp_asvs.yaml.
Use cwe_top25.yaml as prevention checklist during implementation.

Strict

Enforce ALL rules in AGENT_RULES.md and ALL YAML files in policies/.
Block insecure patterns (hardcoded secrets, shell=True, unvalidated input).
Require ASVS chapter-by-chapter audit with severity scoring before final output.

Tip: Enforcement levels work with any profile. For example, --profile lite + a Strict snippet gives you compact rules with maximum rigor.


Agent Setup

GitHub Copilot

VS Code + JetBrains (universal method)

Create .github/copilot-instructions.md at the project root. Copilot Chat reads this file automatically in both VS Code and JetBrains — no IDE settings needed.

Follow ALL security and code quality rules defined in AGENT_RULES.md.

Key mandatory rules:
- Apply OWASP ASVS 5.0.0 to every change
- Prevent all CWE/SANS Top 25 2025 weaknesses
- Use typed exceptions, never bare except
- Never hardcode secrets (CWE-798)
- Validate all inputs at trust boundaries (CWE-20)
- shell=False in subprocess calls (CWE-78)
- Type hints + docstrings on all public APIs
- Structured logging with correlation IDs

Reference policies/ for detailed YAML security rulesets.

VS Code — additional option (settings.json)

Add this to .vscode/settings.json (project-level) or your User Settings JSON (global):

{
  "github.copilot.chat.codeGeneration.instructions": [
    {
      "file": "AGENT_RULES.md"
    }
  ]
}

How to open Settings JSON: Ctrl+Shift+PPreferences: Open User Settings (JSON)

JetBrains — additional option (IDE settings)

  1. Go to SettingsLanguages & FrameworksGitHub Copilot
  2. Find the Copilot ChatCustom Instructions field
  3. Paste:
Follow ALL security rules in AGENT_RULES.md.
Apply OWASP ASVS 5.0.0, CWE/SANS Top 25 2025, NIST SSDF to every change.
Never hardcode secrets. Validate all inputs. Use typed exceptions.
Reference policies/ for YAML security rulesets.

Summary

| IDE | Easiest method | Where | |-----|---------------|-------| | VS Code | Create file | .github/copilot-instructions.md (auto-detected) | | VS Code | Settings JSON | github.copilot.chat.codeGeneration.instructions | | JetBrains | Create file | .github/copilot-instructions.md (auto-detected) | | JetBrains | IDE Settings | Settings → GitHub Copilot → Custom Instructions |


Cursor

Option A: Project rules file

Create .cursorrules at the project root:

Read and follow ALL rules in AGENT_RULES.md for every code change.
Use policies/ as structured security reference.
Apply OWASP ASVS 5.0.0, CWE/SANS Top 25 2025, NIST SSDF to all output.

Option B: IDE settings

Go to Cursor SettingsGeneralRules for AI and paste:

For this project, always read and follow the security and code quality rules
defined in AGENT_RULES.md before writing any code. Apply the
OWASP ASVS 5.0.0 checklist, CWE/SANS Top 25 2025, and all mandatory rules
from that document to every change.

Windsurf

Create .windsurfrules at the project root:

Read AGENT_RULES.md and follow every rule for all code generation,
modification, and review. Apply the security policies in policies/
to all output. Never skip security controls.

Claude (Anthropic)

Via claude.ai Projects

  1. Go to ProjectsProject Knowledge
  2. Upload AGENT_RULES.md
  3. Upload YAML files from policies/ (and include owasp_masvs.yaml for mobile apps)
  4. In Project Instructions, paste:
You are a secure coding agent. Follow ALL rules in the uploaded
AGENT_RULES.md document. Apply the YAML security policies to every
code change. Never skip security controls. When auditing code, use
the OWASP ASVS 5.0.0 checklist with severity scoring from the document.

Via API

system_prompt = open("AGENT_RULES.md").read()

response = client.messages.create(
    model="claude-sonnet-4-20250514",
    system=system_prompt,
    messages=[{"role": "user", "content": "Build a REST API for user management"}]
)

ChatGPT / GPT API

Via Custom GPT (chat.openai.com)

  1. Go to Explore GPTsCreate a GPT
  2. In Instructions, paste the entire contents of AGENT_RULES.md
  3. Upload the 4 YAML policy files under Knowledge

Via API

system_prompt = open("AGENT_RULES.md").read()

response = client.chat.completions.create(
    model="gpt-4o",
    messages=[
        {"role": "system", "content": system_prompt},
        {"role": "user", "content": "Build a REST API for user management"}
    ]
)

Gemini Code Assist / Antigravity

Gemini in IDE

Create .gemini/settings.json:

{
  "codeAssist": {
    "systemInstructions": "Read and follow all rules in AGENT_RULES.md. Apply OWASP ASVS 5.0.0, CWE/SANS Top 25 2025, and NIST SSDF to all code."
  }
}

Antigravity with workflows

Create .agent/workflows/secure-coding.md:

---
description: Apply secure coding standards to all changes
---
1. Read `AGENT_RULES.md` for the complete security ruleset.
2. Apply all 11 mandatory rule domains to every code change.
3. Reference `policies/` for detailed YAML policies.
4. When planning, include a STRIDE threat model.
5. When reviewing, use the OWASP ASVS 5.0.0 checklist and severity scoring.

Cline / Roo Code (VS Code)

Create .clinerules at the project root:

Read AGENT_RULES.md and follow ALL rules.
Apply OWASP ASVS 5.0.0, CWE/SANS Top 25 2025, and NIST SSDF.
Use policies/ YAML files as structured reference.

Aider

Option A: Config file

Create .aider.conf.yml at the project root:

read:
  - AGENT_RULES.md

Option B: CLI flag

aider --read AGENT_RULES.md

Continue.dev

Edit .continue/config.json:

{
  "systemMessage": "Read and follow all security rules in AGENT_RULES.md. Apply OWASP ASVS 5.0.0, CWE/SANS Top 25, and all mandatory rules to every code change.",
  "docs": [
    {
      "title": "Security Rules",
      "startUrl": "AGENT_RULES.md"
    }
  ]
}

OpenCode / PEA Engine

Already integrated — policies are loaded from policies/ automatically and injected into Planner, Executor, and Auditor prompts. No configuration needed.


Monorepo Configuration

Case A: Centralized policy at repo root

Keep one shared policy folder and reference it from each package/app.

Example .github/copilot-instructions.md in a package:

Follow ALL rules in ../../AGENT_RULES.md.
Reference ../../policies/ for YAML security policies.

Case B: Per-service isolation

Use per-service policy files when teams need different strictness:

services/
  payments/AGENT_RULES.md
  payments/policies/
  identity/AGENT_RULES.md
  identity/policies/

This allows stricter rules (for example, payments) without affecting other services.


CI Enforcement (Recommended)

Use CI to prevent drift between instructions and policy files.

Example GitHub Actions check

name: Validate Security Policies
on: [pull_request]

jobs:
  validate:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4
      - uses: actions/setup-python@v5
        with:
          python-version: "3.11"
      - run: pip install pyyaml
      - run: python -c "import yaml,glob; [yaml.safe_load(open(f,encoding='utf-8')) for f in glob.glob('policies/*.yaml')]; print('YAML OK')"
      - run: test -f AGENT_RULES.md

Optional CI policy gates

  • Fail PR if AGENT_RULES.md changes without corresponding CHANGELOG.md update
  • Fail PR if policy version is not bumped after security rule changes
  • Fail PR if README.md agent snippets reference missing files

Standards Covered

| Standard | Version | |----------|---------| | OWASP ASVS | 5.0.0 | | OWASP MASVS (mobile) | 2.1.0 | | OWASP Top 10 LLM | 2025 | | CWE/SANS Top 25 | 2025 | | NIST SP 800-218 (SSDF) | 1.1 | | NIST SP 800-53 | Rev 5 | | NIST AI RMF | 1.0 | | SLSA | 1.0 | | SOLID Principles | — | | 12-Factor App | — | | DORA Metrics | — |


Contributing

Contributions are welcome! Here are some ways to get involved:

  • Add security rules — Reference a CWE, ASVS chapter, or NIST control in AGENT_RULES.md
  • Create a new skill — See the Skills Design and Creation Guide
  • Add agent support — Add setup instructions for a new agent or IDE
  • Improve policies — Extend or refine YAML policy files in policies/

See CONTRIBUTING.md for guidelines and ROADMAP.md for what's planned next.


License

Apache 2.0 — free to use, modify, and distribute with attribution.