The Defensive OpSec Operating Standard

Version 1.0.1 · MIT-licensed · deep-linkable by anchor

A defensive-OpSec operating standard for AI coding agents that perform security review. Five rules — authorization and scope, threat-sketch first, defensive evidence only, standards as vocabulary, honest uncertainty. Four templates — finding packet, INFO.md rubric, scan gate, run closeout. Tool-agnostic in principle; first vehicle is Vercel's deepsec.

Maps to OWASP ASVS 5.0, OWASP WSTG 4.2, the OWASP Threat Modeling Cheat Sheet, NIST SP 800-218 (SSDF v1.1) and 800-218A, NIST AI RMF (AI 100-1) + Generative AI Profile (AI 600-1), CISA Secure by Design and the 2025 CISA SBOM Minimum Elements, SLSA v1.2, OpenSSF Scorecard, Sigstore, FIRST CVSS v4.0, the OWASP GenAI Security Project (LLM Top 10 2025 + Agentic Security Initiative), ISO/IEC 29147 / 30111 / TR 5895, and SEC Reg S-K Item 106 / Form 8-K Item 1.05.

Anchor URLs (citable, stable, deep-linkable)

Adopt in 60 seconds

npx skills add johndfowler/deepsec-skill

Or paste the four-line block from /standard/claude-md-snippet.md into your repo's CLAUDE.md. Or fork the templates into your own AppSec runbook — MIT.

Versioning

v1.0.1 stays at /standard.md and /standard permanently. Future revisions land at /standard/v2.md etc.; existing citations don't rot. Programmatic enforcement via an MCP server is on the v2.0 roadmap, contingent on adoption signal — v1.0.1 is the discipline; v2.0 may be the gate.