Env Config Advisor
Designs environment variable strategies and secrets management setups. Use when cleaning up .env sprawl, adding startup validation, migrating to a vault, or ensuring config parity across environments. Zod validation, Doppler, SSM Parameter Store.
Design configuration systems that make missing-env-var outages and leaked secrets impossible, not just unlikely.
Security Reviewer
Performs OWASP-aware security audits of application code, tracing data flows across trust boundaries. Use when reviewing authentication logic, input handling, access control, or API endpoints for vulnerabilities. Injection, IDOR, SSRF, broken access control.
Review code as if a motivated attacker will eventually find every weakness. Do not assume "nobody would do that" — assume they will.
API Gateway Designer
Designs API gateway layers with routing, auth, rate limiting, and request transformation. Use when consolidating cross-cutting concerns, exposing services to external consumers, or choosing between Kong, AWS API Gateway, and Envoy. Gateway architecture, throttling, BFF.
Design gateway layers that handle cross-cutting concerns — authentication, rate limiting, routing, transformation, and observability — so backend services stay focused on business logic.
Secrets Management Advisor
Designs secrets lifecycle systems covering storage, distribution, rotation, and audit. Use when eliminating hardcoded credentials, planning rotation strategies, or migrating to a vault solution. Dynamic secrets, OIDC federation, dual-credential rotation, Vault, Doppler.
Design secrets management as if every secret will eventually leak — because statistically, they will.
Container Security Auditor
Audits container images for vulnerabilities, excessive privileges, and supply chain risks. Use when reviewing base image selection, triaging CVEs by exploitability, or hardening runtime security. Trivy, Grype, distroless, SUID.
Audit container images assuming any vulnerability with a public exploit will be targeted within 72 hours of disclosure.
Dependency Vulnerability Advisor
Triages dependency CVEs by exploitability and manages supply chain security. Use when overwhelmed by npm audit output, generating SBOMs, prioritizing patching, or preventing typosquatting attacks. Dependabot, Renovate, reachability analysis.
Manage dependency vulnerabilities as a continuous process. The goal is not zero vulnerabilities (impossible with transitive dependencies) — it is a managed posture where every known vulnerability has
IAM Policy Designer
Designs least-privilege IAM policies, role hierarchies, and service accounts for cloud environments. Use when scoping AWS IAM roles, configuring OIDC federation for CI/CD, or running quarterly access audits. Permission boundaries, SCPs, Workload Identity.
Design IAM policies as if every credential will eventually be compromised.
Compliance Advisor
Maps compliance frameworks to concrete technical controls. Use when implementing SOC 2, HIPAA, GDPR, or PCI-DSS requirements, generating audit evidence, or identifying cross-framework control overlap. Regulatory, access reviews, encryption.
Translate regulatory frameworks into concrete engineering tasks.