Add tekimax-security to community catalog#2200
Open
kaman1 wants to merge 1 commit intogithub:mainfrom
Open
Conversation
Adds an entry for TEKIMAX Secure SDD, a security-first extension that wires threat modeling (STRIDE), data contracts, AI guardrails, model governance, automated red teaming, and post-implementation audit into Spec Kit's hook system. - 7 slash commands across SPECIFY / DESIGN / IMPLEMENT / VERIFY - 5 phase hooks: after_specify, after_plan, before_implement, after_implement, before_analyze - Apache-2.0 licensed - Repository: https://github.com/TEKIMAX/speckit-security
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Adds
tekimax-security(TEKIMAX Secure SDD) to the community catalog.What it does
tekimax-securityis a security-first extension that plugs into Spec Kit's hook system and adds security gates to the SDD lifecycle. It catches AI technical debt at the point where it's cheapest to fix — in the spec, before code exists.It provides 7 commands and 5 hooks wired into
after_specify,after_plan,before_implement,after_implement, andbefore_analyze. It ships an automated red-team runner that parses scenarios and executes them against a staging endpoint with safety guards (refuses prod URLs, rate-limited, injects anX-Red-Teamheader), then classifies responses and writes a JSONL trace for audit.The extension is stack-agnostic — it enforces the existence of security controls (AI gateway, guardrails, PII encryption, RBAC, schema validation) without requiring specific vendors.
Why this fills a gap
Spec Kit excels at turning specifications into code. The existing
security-reviewextension in the catalog is a 3-command, 0-hook post-implementation code audit.tekimax-securityis different: it's a lifecycle-wide gate system that enforces security controls at every SDD phase transition via hooks, and includes proactive STRIDE threat modeling, model governance gating, and an automated red-team runner.Verification
extension.ymlvalidates against the spec-kit schemaspecify extension add --devand registers all 7 commands.claude/skills/speckit-tekimax-security-*.extensionignoreexcludes dev-only filesLinks
Compatibility
Requires
speckit_version >= 0.1.0. Tested against 0.6.2.Contact
Happy to iterate on formatting, wording, or the catalog entry structure if anything's off. Thanks for shipping the extension API — it's genuinely a great surface to build on.