Utility Skills
Cross-phase security utilities for checklists, threat intelligence, compliance mapping, training, and penetration testing.
Purpose
Utility skills work across all Security Lifecycle phases. They have no prerequisites and can be run anytime — for security checklists, threat research, compliance mapping, training development, or penetration test planning.
Skills
Security Checklist
/security:security-checklist <topic>Generates security checklists tailored to specific projects, releases, or environments. Covers pre-deployment checks, security review gates, and launch readiness criteria.
Output: Security checklist with categorized verification items → .metapowers/security/<topic>/security-checklist.md
Threat Intel
/security:threat-intel <topic>Researches threat intelligence for specific technologies, industries, or threat actors. Provides structured analysis of relevant threats, TTPs, and recommended countermeasures.
Output: Threat intelligence report with TTP analysis → .metapowers/security/<topic>/threat-intel.md
Compliance Map
/security:compliance-map <topic>Maps security controls to compliance framework requirements. Supports SOC 2, ISO 27001, PCI DSS, HIPAA, NIST 800-53, and other frameworks with control cross-references.
Output: Compliance mapping with control cross-references → .metapowers/security/<topic>/compliance-map.md
Security Training
/security:security-training <topic>Creates security awareness training materials for development teams and staff. Covers secure development practices, phishing awareness, data handling, and role-specific training modules.
Output: Training materials with modules and assessment criteria → .metapowers/security/<topic>/security-training.md
Pentest Plan
/security:pentest-plan <topic>Plans penetration testing engagements. Covers scope definition, rules of engagement, testing methodology, tool selection, reporting requirements, and remediation timelines.
Output: Penetration test plan with scope and methodology → .metapowers/security/<topic>/pentest-plan.md