Skip to content

feat(skill): introduce owasp-cicd#1246

Merged
katriendg merged 27 commits intomicrosoft:mainfrom
JasonTheDeveloper:feat/1243
Apr 10, 2026
Merged

feat(skill): introduce owasp-cicd#1246
katriendg merged 27 commits intomicrosoft:mainfrom
JasonTheDeveloper:feat/1243

Conversation

@JasonTheDeveloper
Copy link
Copy Markdown
Contributor

Pull Request

Description

In alignment with phase 2 discussed in #480 (comment), this PR introduces the OWASP CICD Top 10 skill to hve-core and the security reviewer agent.

Related Issue(s)

Closes #1243

Type of Change

Select all that apply:

Code & Documentation:

  • Bug fix (non-breaking change fixing an issue)
  • New feature (non-breaking change adding functionality)
  • Breaking change (fix or feature causing existing functionality to change)
  • Documentation update

Infrastructure & Configuration:

  • GitHub Actions workflow
  • Linting configuration (markdown, PowerShell, etc.)
  • Security configuration
  • DevContainer configuration
  • Dependency update

AI Artifacts:

  • Reviewed contribution with prompt-builder agent and addressed all feedback
  • Copilot instructions (.github/instructions/*.instructions.md)
  • Copilot prompt (.github/prompts/*.prompt.md)
  • Copilot agent (.github/agents/*.agent.md)
  • Copilot skill (.github/skills/*/SKILL.md)

Note for AI Artifact Contributors:

  • Agents: Research, indexing/referencing other project (using standard VS Code GitHub Copilot/MCP tools), planning, and general implementation agents likely already exist. Review .github/agents/ before creating new ones.
  • Skills: Must include both bash and PowerShell scripts. See Skills.
  • Model Versions: Only contributions targeting the latest Anthropic and OpenAI models will be accepted. Older model versions (e.g., GPT-3.5, Claude 3) will be rejected.
  • See Agents Not Accepted and Model Version Requirements.

Other:

  • Script/automation (.ps1, .sh, .py)
  • Other (please describe):

Testing

To be able to test the owasp-cicd skill using the security reviewer agent you will need a repository containing cicd configuration.

  1. Either select the Security Reviewer agent or invoke the agent via the /security-revew instruction
  2. Use the following prompt analyse the code and produce a vulnerability report
    • If you are testing to see if the codebase-profiler.agent.md picks up that the repository contains cicd configuration (like github workflow) and thus uses the owasp-cicd skill then that's all you need.
    • If you only want to test the owasp-cicd is used, in your prompt add targetSkill=owasp-cicd

You should see in the output report the owasp-cicd skill being referenced and used.

Checklist

Required Checks

  • Documentation is updated (if applicable)
  • Files follow existing naming conventions
  • Changes are backwards compatible (if applicable)
  • Tests added for new functionality (if applicable)

AI Artifact Contributions

  • Used /prompt-analyze to review contribution
  • Addressed all feedback from prompt-builder review
  • Verified contribution follows common standards and type-specific requirements

Required Automated Checks

The following validation commands must pass before merging:

  • Markdown linting: npm run lint:md
  • Spell checking: npm run spell-check
  • Frontmatter validation: npm run lint:frontmatter
  • Skill structure validation: npm run validate:skills
  • Link validation: npm run lint:md-links
  • PowerShell analysis: npm run lint:ps
  • Plugin freshness: npm run plugin:generate

Security Considerations

  • This PR does not contain any sensitive or NDA information
  • Any new dependencies have been reviewed for security issues
  • Security-related scripts follow the principle of least privilege

@JasonTheDeveloper JasonTheDeveloper requested a review from a team as a code owner March 31, 2026 04:24
@codecov-commenter
Copy link
Copy Markdown

codecov-commenter commented Mar 31, 2026

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 87.65%. Comparing base (060f64d) to head (ef42b0f).

Additional details and impacted files

Impacted file tree graph

@@            Coverage Diff             @@
##             main    #1246      +/-   ##
==========================================
- Coverage   87.66%   87.65%   -0.02%     
==========================================
  Files          61       61              
  Lines        9328     9328              
==========================================
- Hits         8177     8176       -1     
- Misses       1151     1152       +1     
Flag Coverage Δ
pester 85.22% <ø> (-0.02%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.
see 1 file with indirect coverage changes

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

@WilliamBerryiii
Copy link
Copy Markdown
Member

@JasonTheDeveloper - will you run this one over HVE Core itself and share the report in this thread?

@JasonTheDeveloper
Copy link
Copy Markdown
Contributor Author

@WilliamBerryiii yeah sure. I ran the owasp-cicd skill specifcally and here are the results:


OWASP Security Assessment Report

Date: 2026-04-01
Repository: hve-core
Agent: Security Reviewer
Skills applied: owasp-cicd

Caution

This prompt is an assistive tool only and does not replace professional security tooling (SAST, DAST, SCA, penetration testing, compliance scanners) or qualified human review. All AI-generated vulnerability findings must be reviewed and validated by qualified security professionals before use. AI outputs may contain inaccuracies, miss critical threats, or produce recommendations that are incomplete or inappropriate for your environment.


Executive Summary

A comprehensive CI/CD security assessment was performed against the hve-core repository using the OWASP CI/CD Top 10 framework. All 10 controls were evaluated, producing 9 PASS findings and 1 NOT_ASSESSED finding (IAM configuration, which resides outside source code). No vulnerabilities were identified — the repository demonstrates strong pipeline security posture with SHA-pinned actions, least-privilege permissions, secret scanning, SBOM generation, build provenance attestation, and deterministic dependency management. All 10 findings passed through verification unchanged.

Summary Counts

Status Count
PASS 9
FAIL 0
PARTIAL 0
NOT_ASSESSED 1
Total 10

Severity Breakdown (FAIL + PARTIAL only)

Severity Count
CRITICAL 0
HIGH 0
MEDIUM 0
LOW 0

Verification Summary

Verdict Count
CONFIRMED 0
DISPROVED 0
DOWNGRADED 0
UNCHANGED 10

Findings by Framework

owasp-cicd

ID Title Status Severity Location Finding Recommendation Verdict Justification
CICD-SEC-1:2025 Insufficient Flow Control Mechanisms PASS N/A N/A PR validation runs on pull_request events against protected branches (main, develop). The stable release pipeline triggers only on push to main. Pre-release pipelines require merged PRs. All pipelines gate on multiple validation jobs before release steps execute. No auto-merge rules were found in the codebase. Continue enforcing branch protection rules at the GitHub repository settings level. UNCHANGED Pass-through; no adversarial verification required.
CICD-SEC-3:2025 Dependency Chain Abuse PASS N/A N/A The repository has a .npmrc enforcing save-exact=true, package-lock=true, and audit=true. Both package-lock.json and docs/docusaurus/package-lock.json exist for lockfile-based deterministic installs. All npm ci calls use lockfiles. Python dependencies use uv sync with uv.lock files. A dependency-review.yml workflow runs actions/dependency-review-action on PRs with license checks and OpenSSF Scorecard warnings. A pip-audit.yml workflow audits Python dependencies. Additionally, a dependency-pinning-scan.yml workflow enforces SHA pinning compliance for all dependency types. No additional action needed. UNCHANGED Pass-through; no adversarial verification required.
CICD-SEC-4:2025 Poisoned Pipeline Execution PASS N/A N/A All workflows trigger on pull_request (not pull_request_target), which runs with read-only GITHUB_TOKEN on the PR merge commit in a safe context. No workflows were found that trigger on pull_request_target. The PR validation pipeline uses only contents: read permissions. Release pipelines trigger on push to main (post-merge only). The copilot-setup-steps.yml triggers only on workflow_dispatch. Pipeline configuration files are in the repository with branch protection expected on main. Ensure branch protection rules on main require PR review before merge to prevent direct pushes that trigger the release pipeline. UNCHANGED Pass-through; no adversarial verification required.
CICD-SEC-5:2025 Insufficient PBAC PASS N/A N/A Every workflow declares top-level permissions: contents: read and then grants minimal per-job permissions (e.g., security-events: write only for SARIF upload jobs, id-token: write only for attestation/OIDC jobs). This follows the principle of least privilege extensively. The marketplace publish job uses a protected GitHub environment (marketplace). All jobs run on GitHub-hosted ubuntu-latest runners, which are ephemeral by design. No additional action needed. UNCHANGED Pass-through; no adversarial verification required.
CICD-SEC-6:2025 Insufficient Credential Hygiene PASS N/A N/A Gitleaks secret scanning runs on every PR (gitleaks-scan.yml) and as part of the stable release pipeline with soft-fail: false, blocking merges on detected secrets. Full git history is scanned (fetch-depth: 0). Secrets are stored in GitHub Secrets/Variables (e.g., RELEASE_APP_PRIVATE_KEY, AZURE_CLIENT_ID), never in code. Almost all checkout steps use persist-credentials: false to prevent token leakage. The marketplace publish uses OIDC federation (short-lived tokens) rather than static credentials. Continue periodic rotation of the GitHub App private key and Azure service principal credentials. UNCHANGED Pass-through; no adversarial verification required.
CICD-SEC-7:2025 Insecure System Configuration PASS N/A N/A All CI/CD runs on GitHub-hosted runners (ubuntu-latest), eliminating self-managed infrastructure risks. Workflows use concurrency groups with cancel-in-progress to prevent resource exhaustion. A workflow-permissions-scan.yml workflow validates that all workflows have proper permissions blocks. CodeQL analysis runs weekly and on PRs. The OpenSSF Scorecard runs weekly and after releases. ActionLint validates workflow syntax. No additional action needed. UNCHANGED Pass-through; no adversarial verification required.
CICD-SEC-8:2025 Ungoverned Usage of 3rd Party Services PASS N/A N/A All third-party GitHub Actions are pinned by full SHA with version comments (e.g., actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v4.2.2). An action-version-consistency-scan.yml workflow ensures consistent action versions across all workflows. The dependency-pinning-scan.yml enforces SHA pinning compliance with a 95% threshold. The sha-staleness-check.yml detects outdated SHA pins. Third-party actions used are well-known. Weekly security maintenance reviews all third-party integrations. Periodically review the third-party action inventory for actions that are no longer maintained. Consider documenting the approval rationale for each third-party action. UNCHANGED Pass-through; no adversarial verification required.
CICD-SEC-9:2025 Improper Artifact Integrity Validation PASS N/A N/A The release pipelines generate SBOMs using anchore/sbom-action in SPDX JSON format for all artifacts (VSIX extensions, plugin packages, and dependencies). Build provenance is attested using actions/attest-build-provenance (Sigstore). SBOMs are independently attested via actions/attest. All release assets include .sigstore.json and .intoto.jsonl provenance bundles. Verification instructions are appended to release notes. Third-party tool downloads in workflows verify SHA256 checksums before use. The Get-VerifiedDownload.ps1 library script provides a reusable pattern for hash-verified downloads. No additional action needed. UNCHANGED Pass-through; no adversarial verification required.
CICD-SEC-10:2025 Insufficient Logging and Visibility PASS N/A N/A Multiple SARIF-producing workflows upload results to the GitHub Security tab: CodeQL, Gitleaks, dependency pinning scan, workflow permissions scan, action version consistency scan, and OpenSSF Scorecard. Workflow artifacts are retained (30–90 days) for audit trails. Job summaries are generated for visibility. Weekly security maintenance produces consolidated summary reports and creates GitHub issues for stale SHA pins. All security-relevant workflows run both on PRs and on schedule (weekly). Consider increasing artifact retention for security-sensitive scan results if organizational compliance requires longer retention periods. UNCHANGED Pass-through; no adversarial verification required.
CICD-SEC-2:2025 Inadequate Identity and Access Management NOT_ASSESSED N/A N/A IAM configuration lives in GitHub organization/repository settings and cannot be assessed from source code alone. Workflows use GitHub App tokens (actions/create-github-app-token) scoped via RELEASE_APP_ID / RELEASE_APP_PRIVATE_KEY rather than broad PATs, which is a positive signal. The marketplace publish workflow uses OIDC (azure/login with client-id, tenant-id, subscription-id) and a protected marketplace environment. Periodically audit GitHub organization member access, repository collaborators, and GitHub App installation permissions. Verify that the Release App has minimal required permissions. UNCHANGED Pass-through; not assessable from source code.

Detailed Remediation Guidance

None identified.

Disproved Findings

None.


Remediation Checklist

ID Control Status Evidence

No CONFIRMED or DOWNGRADED findings require remediation.


Appendix: Skills Used

Skill Framework Version Reference
owasp-cicd OWASP Top 10 CI/CD Security Risks 1.0.0 owasp.org/www-project-top-10-ci-cd-security-risks

@WilliamBerryiii
Copy link
Copy Markdown
Member

@WilliamBerryiii yeah sure. I ran the owasp-cicd skill specifcally and here are the results:

OWASP Security Assessment Report

Date: 2026-04-01 Repository: hve-core Agent: Security Reviewer Skills applied: owasp-cicd

Caution

This prompt is an assistive tool only and does not replace professional security tooling (SAST, DAST, SCA, penetration testing, compliance scanners) or qualified human review. All AI-generated vulnerability findings must be reviewed and validated by qualified security professionals before use. AI outputs may contain inaccuracies, miss critical threats, or produce recommendations that are incomplete or inappropriate for your environment.

Executive Summary

A comprehensive CI/CD security assessment was performed against the hve-core repository using the OWASP CI/CD Top 10 framework. All 10 controls were evaluated, producing 9 PASS findings and 1 NOT_ASSESSED finding (IAM configuration, which resides outside source code). No vulnerabilities were identified — the repository demonstrates strong pipeline security posture with SHA-pinned actions, least-privilege permissions, secret scanning, SBOM generation, build provenance attestation, and deterministic dependency management. All 10 findings passed through verification unchanged.

Summary Counts

Status Count
PASS 9
FAIL 0
PARTIAL 0
NOT_ASSESSED 1
Total 10

Severity Breakdown (FAIL + PARTIAL only)

Severity Count
CRITICAL 0
HIGH 0
MEDIUM 0
LOW 0

Verification Summary

Verdict Count
CONFIRMED 0
DISPROVED 0
DOWNGRADED 0
UNCHANGED 10

Findings by Framework

owasp-cicd

ID Title Status Severity Location Finding Recommendation Verdict Justification
CICD-SEC-1:2025 Insufficient Flow Control Mechanisms PASS N/A N/A PR validation runs on pull_request events against protected branches (main, develop). The stable release pipeline triggers only on push to main. Pre-release pipelines require merged PRs. All pipelines gate on multiple validation jobs before release steps execute. No auto-merge rules were found in the codebase. Continue enforcing branch protection rules at the GitHub repository settings level. UNCHANGED Pass-through; no adversarial verification required.
CICD-SEC-3:2025 Dependency Chain Abuse PASS N/A N/A The repository has a .npmrc enforcing save-exact=true, package-lock=true, and audit=true. Both package-lock.json and docs/docusaurus/package-lock.json exist for lockfile-based deterministic installs. All npm ci calls use lockfiles. Python dependencies use uv sync with uv.lock files. A dependency-review.yml workflow runs actions/dependency-review-action on PRs with license checks and OpenSSF Scorecard warnings. A pip-audit.yml workflow audits Python dependencies. Additionally, a dependency-pinning-scan.yml workflow enforces SHA pinning compliance for all dependency types. No additional action needed. UNCHANGED Pass-through; no adversarial verification required.
CICD-SEC-4:2025 Poisoned Pipeline Execution PASS N/A N/A All workflows trigger on pull_request (not pull_request_target), which runs with read-only GITHUB_TOKEN on the PR merge commit in a safe context. No workflows were found that trigger on pull_request_target. The PR validation pipeline uses only contents: read permissions. Release pipelines trigger on push to main (post-merge only). The copilot-setup-steps.yml triggers only on workflow_dispatch. Pipeline configuration files are in the repository with branch protection expected on main. Ensure branch protection rules on main require PR review before merge to prevent direct pushes that trigger the release pipeline. UNCHANGED Pass-through; no adversarial verification required.
CICD-SEC-5:2025 Insufficient PBAC PASS N/A N/A Every workflow declares top-level permissions: contents: read and then grants minimal per-job permissions (e.g., security-events: write only for SARIF upload jobs, id-token: write only for attestation/OIDC jobs). This follows the principle of least privilege extensively. The marketplace publish job uses a protected GitHub environment (marketplace). All jobs run on GitHub-hosted ubuntu-latest runners, which are ephemeral by design. No additional action needed. UNCHANGED Pass-through; no adversarial verification required.
CICD-SEC-6:2025 Insufficient Credential Hygiene PASS N/A N/A Gitleaks secret scanning runs on every PR (gitleaks-scan.yml) and as part of the stable release pipeline with soft-fail: false, blocking merges on detected secrets. Full git history is scanned (fetch-depth: 0). Secrets are stored in GitHub Secrets/Variables (e.g., RELEASE_APP_PRIVATE_KEY, AZURE_CLIENT_ID), never in code. Almost all checkout steps use persist-credentials: false to prevent token leakage. The marketplace publish uses OIDC federation (short-lived tokens) rather than static credentials. Continue periodic rotation of the GitHub App private key and Azure service principal credentials. UNCHANGED Pass-through; no adversarial verification required.
CICD-SEC-7:2025 Insecure System Configuration PASS N/A N/A All CI/CD runs on GitHub-hosted runners (ubuntu-latest), eliminating self-managed infrastructure risks. Workflows use concurrency groups with cancel-in-progress to prevent resource exhaustion. A workflow-permissions-scan.yml workflow validates that all workflows have proper permissions blocks. CodeQL analysis runs weekly and on PRs. The OpenSSF Scorecard runs weekly and after releases. ActionLint validates workflow syntax. No additional action needed. UNCHANGED Pass-through; no adversarial verification required.
CICD-SEC-8:2025 Ungoverned Usage of 3rd Party Services PASS N/A N/A All third-party GitHub Actions are pinned by full SHA with version comments (e.g., actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v4.2.2). An action-version-consistency-scan.yml workflow ensures consistent action versions across all workflows. The dependency-pinning-scan.yml enforces SHA pinning compliance with a 95% threshold. The sha-staleness-check.yml detects outdated SHA pins. Third-party actions used are well-known. Weekly security maintenance reviews all third-party integrations. Periodically review the third-party action inventory for actions that are no longer maintained. Consider documenting the approval rationale for each third-party action. UNCHANGED Pass-through; no adversarial verification required.
CICD-SEC-9:2025 Improper Artifact Integrity Validation PASS N/A N/A The release pipelines generate SBOMs using anchore/sbom-action in SPDX JSON format for all artifacts (VSIX extensions, plugin packages, and dependencies). Build provenance is attested using actions/attest-build-provenance (Sigstore). SBOMs are independently attested via actions/attest. All release assets include .sigstore.json and .intoto.jsonl provenance bundles. Verification instructions are appended to release notes. Third-party tool downloads in workflows verify SHA256 checksums before use. The Get-VerifiedDownload.ps1 library script provides a reusable pattern for hash-verified downloads. No additional action needed. UNCHANGED Pass-through; no adversarial verification required.
CICD-SEC-10:2025 Insufficient Logging and Visibility PASS N/A N/A Multiple SARIF-producing workflows upload results to the GitHub Security tab: CodeQL, Gitleaks, dependency pinning scan, workflow permissions scan, action version consistency scan, and OpenSSF Scorecard. Workflow artifacts are retained (30–90 days) for audit trails. Job summaries are generated for visibility. Weekly security maintenance produces consolidated summary reports and creates GitHub issues for stale SHA pins. All security-relevant workflows run both on PRs and on schedule (weekly). Consider increasing artifact retention for security-sensitive scan results if organizational compliance requires longer retention periods. UNCHANGED Pass-through; no adversarial verification required.
CICD-SEC-2:2025 Inadequate Identity and Access Management NOT_ASSESSED N/A N/A IAM configuration lives in GitHub organization/repository settings and cannot be assessed from source code alone. Workflows use GitHub App tokens (actions/create-github-app-token) scoped via RELEASE_APP_ID / RELEASE_APP_PRIVATE_KEY rather than broad PATs, which is a positive signal. The marketplace publish workflow uses OIDC (azure/login with client-id, tenant-id, subscription-id) and a protected marketplace environment. Periodically audit GitHub organization member access, repository collaborators, and GitHub App installation permissions. Verify that the Release App has minimal required permissions. UNCHANGED Pass-through; not assessable from source code.

Detailed Remediation Guidance

None identified.

Disproved Findings

None.

Remediation Checklist

ID Control Status Evidence
No CONFIRMED or DOWNGRADED findings require remediation.

Appendix: Skills Used

Skill Framework Version Reference
owasp-cicd OWASP Top 10 CI/CD Security Risks 1.0.0 owasp.org/www-project-top-10-ci-cd-security-risks

This makes me really happy!

Copy link
Copy Markdown
Member

@WilliamBerryiii WilliamBerryiii left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for this contribution — the content quality across all 10 reference documents is excellent and the agent integrations are thorough.

A few items to address before merge, detailed in inline comments below.

Positive observations:

  • All 10 vulnerability reference documents follow a consistent, well-structured format
  • Agent integrations (security-reviewer, codebase-profiler, finding-deep-verifier, skill-assessor) are all correctly updated
  • Collection and plugin registrations are complete with correct maturity: experimental
  • Symlinks follow the established conventions
  • Using "index" rather than "master index" is the preferred wording — we will update the existing skills to match
  • Using a hyphen in security.collection.md is the preferred punctuation — we will update existing entries to match

Comment thread .github/skills/security/owasp-cicd/SKILL.md
Comment thread .github/skills/security/owasp-cicd/SKILL.md Outdated
Comment thread .github/skills/security/owasp-cicd/references/07-insecure-system-configuration.md Outdated
Comment thread .github/skills/security/owasp-cicd/references/00-vulnerability-index.md Outdated
@katriendg
Copy link
Copy Markdown
Contributor

Thanks for the work, this looks good to me now.

@WilliamBerryiii if there is nothing missing around the trademark/copyright usage across the titles (just keeping the attribution and notice at the bottom of skill), then I think we can approve and merge?

@WilliamBerryiii
Copy link
Copy Markdown
Member

@katriendg ... had a side chat with @JasonTheDeveloper and we agreed that we'd get these merged and fast follow with a bulk license update across the 3 so that we didn't duplicate work. Having that work in a single PR will make it easier for us to see how the third party notices are handled and ensure a uniform approach. I can also then follow that with some skill level automation to ensure we're taking a structured approach as we pull more skills in.

@katriendg katriendg merged commit a3acef3 into microsoft:main Apr 10, 2026
46 checks passed
@JasonTheDeveloper JasonTheDeveloper deleted the feat/1243 branch April 10, 2026 06:19
MukundaKatta added a commit to MukundaKatta/hve-core that referenced this pull request Apr 20, 2026
…ptions

Issue microsoft#1320 (part 2 of 2) — the 'master index' → 'index' rewording
from part 1 already landed, so this PR only carries the em-dash →
hyphen change decided during review of microsoft#1246.

Replaces the ' — ' separator between bolded bullet labels and their
descriptions with ' - ' (hyphen) across every collection file:

  collections/ado.collection.md
  collections/coding-standards.collection.md
  collections/data-science.collection.md
  collections/design-thinking.collection.md
  collections/experimental.collection.md
  collections/github.collection.md
  collections/hve-core.collection.md
  collections/hve-core-all.collection.md
  collections/installer.collection.md
  collections/project-planning.collection.md
  collections/rai-planning.collection.md

Also mirrors the change in each plugins/<name>/README.md so the
generated plugin outputs match the source collection without
requiring a separate 'npm run plugin:generate' follow-up. The generate
pipeline is the canonical way to keep these in sync, and running it
locally with both files would produce the same result.

Only line-start bullet patterns (^\s*-\s+\*\*...\*\*\s+—\s+) are
rewritten; em dashes in prose sentences are left alone, matching the
issue's scope ("All bullet-point descriptions currently use ' — ' as
the separator").

Closes microsoft#1320 (part 2).
WilliamBerryiii pushed a commit that referenced this pull request Apr 24, 2026
## Pre-Release 3.3.101

### ✨ Features

- add removed maturity tier and retire owasp-docker (#1444)
- add evaluation dataset creator (#1279)
- align RAI planner with guide, remove scoring, improve UX (#1287)
- add PSGallery staleness check and BOM cleanup (#1379)
- ISA-95 network planner agent (#1177)
- auto-generate collection.md with maturity filtering (#1316)
- add folder-consistency check and standardize WARN outp… (#1350)
- add synth-data-generate prompt to data-science collection (#1419)
- add canonical deck workflow and customer-card rendering for design
thinking (#1413)
- add Figma MCP integration for DT artifact export (#1222)
- introduce `owasp-docker` (#1245)
- replace hve-core-specific references with portable discovery-based
language (#1335)
- introduce `owasp-cicd` (#1246)
- add secure-by-design knowledge skill (#1223)
- introduce `owasp-infrastructure` (#1244)
- introduce `owasp-mcp` (#1207)
- add OutputPath parameter to Invoke-LinkLanguageCheck.ps1 (#1229)
- add -OutputPath parameter to Validate-SkillStructure.ps1 (#1225)
- add maintainer-only skip-review label guard (#1293)
- add extension collections overview and integrate into getting started
flow (#950)
- add agentic workflows for automated issue triage, implementation, PR
review, dependency review, and doc-staleness detection (#1219)
- consolidate package-lock.json version sync into
Update-VersionFiles.ps1 (#1240)
- add standards code review agent and full review orchestrator (#1174)
- standardize pytest-mock as Python mocking framework (#1170)
- add Jira backlog workflows and Jira/GitLab skills (#978)
- add centralized version bump script and supply-chain attestation
(#1183)

### 🐛 Bug Fixes

- pin PowerShell-Yaml to 0.4.7 across all install sites (#1378)
- close fork-PR/workflow-file-PR secret-strip gap and normalize
upload-artifact version (#1421)
- replace stream-based lookahead with array indexing in
list-changed-files.sh (#1376)
- centralize ISO 8601 timestamp regex in CIHelpers (#1343)
- update stale documentation date in release-process.md (#1363)
- pin basic-ftp to 5.3.0 to resolve GHSA-rp42-5vxx-qpwr (#1374)
- add bot filter to dependency PR review workflow (#1362)
- resolve pip-audit findings in powerpoint, gitlab, and jira skill lock
files (#1360)
- standardize Timestamp JSON key casing across all lint result files
(#1314)
- add synchronize trigger to PR Review workflow (#1323)
- standardize timestamp in Validate-SkillStructure.ps1 to use
Get-StandardTimestamp (#1280)
- add parallel subagent dispatch and structured JSON contracts to
code-review-full (#1304)
- standardize timestamp in SecurityHelpers.psm1 to use
Get-StandardTimestamp (#1284)
- standardize timestamps in Test-DependencyPinning.ps1 and
SecurityClasses.psm1 (#1282)
- derive collection artifact counts from YAML at build time (#1275)
- standardize timestamp in FrontmatterValidation.psm1 to use
Get-StandardTimestamp (#1285)
- standardize timestamp in Markdown-Link-Check.ps1 to use
Get-StandardTimestamp (#1283)
- escape hyphens in Mermaid diagram on Collections page (#1262)
- add summary timestamp to PSScriptAnalyzer output (#1211)
- fix plugin compatibility and robustness for coding-standards code
review agents (#1289)
- standardize timestamp in Test-CopyrightHeaders.ps1 to use
Get-StandardTimestamp (#1278)
- standardize timestamp in Invoke-YamlLint.ps1 to use
Get-StandardTimestamp (#1270)
- standardize timestamp in Invoke-LinkLanguageCheck.ps1 to use
Get-StandardTimestamp (#1264)
- fix dependency-review path filters and sparse-checkout cone mode
(#1259)
- replace invalid bare tool names with official tool identifiers (#1198)
- fix broken links and remove orphaned reference in code review docs
(#1257)
- exclude Python env dirs from skill validation warnings (#1255)
- pin happy-dom and serialize-javascript to resolve Dependabot
vulnerabilities (#1253)
- remove Mermaid diagram and add missing collection cards (#1247)
- disable MCP servers by default to prevent token limit errors (#1144)
- sync package-lock.json after pre-release version bump (#1236)
- separate mermaid node declarations and add dynamic diagram generation
with tests (#1215)
- replace anchor links in meeting-analyst with bold text references
(#1201)
- remove recursive symlinks in jira and gitlab skill directories (#1233)
- validate-installation scripts now check .github/skills directory
(#1010) (#1206)
- resolve npm audit vulnerabilities via dependency overrides (#1200)
- add post-release triggers to scorecard workflow (#1186)
- add missing .md extensions to relative links in agent documentation
(#1180)

### 📚 Documentation

- broaden Security Review description beyond OWASP (#1385)
- document maintainer advisory mode and skip-review label guard (#1386)
- document ExcludePaths/OutputPath for Invoke-LinkLanguageCheck (#1383)
- CLI getting-started: clarify plugin install commands as alternatives
(-all vs base) (#1251)

### ♻️ Refactoring

- align agent and prompt folder names to collection identifier (#1210)

### 🔧 Maintenance

- pin PSScriptAnalyzer to 1.25.0 and sync stale workflow version
comments (#1389)
- bump lxml from 6.0.2 to 6.1.0 in
/.github/skills/experimental/powerpoint (#1424)
- bump @vscode/vsce from 3.7.1 to 3.9.1 in the npm-dependencies group
(#1390)
- bump the github-actions group across 1 directory with 7 updates
(#1391)
- bump follow-redirects from 1.15.11 to 1.16.0 in /docs/docusaurus
(#1356)
- upgrade Node.js from 20 to 24 and bump cspell to v10 (#1353)
- bump basic-ftp from 5.2.0 to 5.2.1 (#1324)
- update github/gh-aw-actions requirement to
536ea1bad8c6715d098a9dc1afea8d403733acfe in the github-actions group
across 1 directory (#1298)
- update security instruction attributions and compliance (#1294)
- bump the npm-dependencies group with 2 updates (#1297)
- pre-release 3.3.41 (#1252)
- streamline RAI Planner phase structure and documentation (#1273)
- bump happy-dom from 20.8.8 to 20.8.9 in /docs/docusaurus (#1237)
- pre-release 3.3.27 (#1191)
- bump pygments from 2.19.2 to 2.20.0 in /.github/skills/gitlab/gitlab
(#1234)
- bump path-to-regexp from 0.1.12 to 0.1.13 in /docs/docusaurus (#1226)
- bump the github-actions group with 4 updates (#1231)
- add missing folders and alphabetize location lists (#1193)
- bump brace-expansion (#1224)
- bump handlebars from 4.7.8 to 4.7.9 in /docs/docusaurus (#1217)
- bump brace-expansion from 5.0.3 to 5.0.5 in /docs/docusaurus (#1213)
- pre-release 3.3.10 (#1187)
- bump markdownlint-cli2 from 0.21.0 to 0.22.0 in the npm-dependencies
group (#1175)
- bump the github-actions group with 3 updates (#1176)
- pre-release 3.3.1 (#1165)

---
*Managed automatically by pre-release workflow.*

Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

feat(skills): add owasp-cicd skill for OWASP Top 10 cicd vulnerability assessment

4 participants