Awesome-omni-skill mandate-2-4-4-runtime-evidence-intake-and-guidance
Collect natural-language system context and generate supporting evidence guidance for Mandate 2.4.4 Secure Inter-Agent Communication, including mTLS, certificate lifecycle, and network policy proof.
install
source · Clone the upstream repo
git clone https://github.com/diegosouzapw/awesome-omni-skill
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/diegosouzapw/awesome-omni-skill "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/tools/mandate-2-4-4-runtime-evidence-intake-and-guidance" ~/.claude/skills/diegosouzapw-awesome-omni-skill-mandate-2-4-4-runtime-evidence-intake-and-guidan && rm -rf "$T"
manifest:
skills/tools/mandate-2-4-4-runtime-evidence-intake-and-guidance/SKILL.mdsource content
Mandate 2.4.4 Runtime Evidence Intake and Guidance Skill
Mandate
- ID: 2.4.4
- Title: Secure Inter-Agent Communication
Mitigates
- ASI07 Insecure Inter-Agent Communication
Objective
Gather communication topology context and produce a complete evidence plan proving encryption, mutual authentication, and channel integrity across agent interactions.
Natural-Language Intake Workflow
- Ask which agents/services communicate and over which protocols.
- Ask whether service mesh or custom TLS is used.
- Ask how certificates are issued, rotated, and revoked.
- Ask how trust anchors/CA chains are managed.
- Ask how unauthorized endpoints are blocked.
- Ask how replay/spoofing/eavesdropping risks are tested.
Context Normalization Schema
Capture and normalize answers into:
: agent pairs, protocols, ports, transport paths.comm_topology
: TLS versions, cipher policies, mTLS requirements.crypto_posture
: CA, cert issuance workflow, SAN validation.identity_trust_chain
: rotation cadence, revocation process, expiration handling.cert_lifecycle
: firewall/network policy/service mesh authz rules.network_enforcement
: signatures/MAC/nonces/replay defense controls.integrity_controls
: penetration tests and abuse simulations.security_validation
Supporting Documents to Request
- Service mesh or communication architecture diagrams.
- TLS/mTLS configuration and certificate authority details.
- Certificate lifecycle logs (issuance, rotation, revocation).
- Inter-service firewall/network policy exports.
- Security test reports for spoofing/eavesdropping/replay.
Guidance to Generate Supporting Evidence
- Generate communication topology evidence.
- Export service maps, endpoint inventories, and traffic policy maps.
- Generate TLS/mTLS posture evidence.
- Export active TLS and peer-authentication policies.
- Generate certificate lifecycle evidence.
- Export CA inventory and cert issuance/rotation/revocation logs.
- Generate network policy evidence.
- Export inter-service allow/deny rules proving least-connectivity.
- Generate security validation evidence.
- Export test reports showing resistance to spoofing/replay/eavesdropping.
System Command Templates (Adapt to Environment)
- Kubernetes service and policy map:
kubectl get svc -A -o wide > services_export.txtkubectl get networkpolicy -A -o yaml > network_policies.yaml
- Istio/mesh security policies (if applicable):
kubectl get peerauthentication -A -o yaml > peerauthentication.yamlkubectl get destinationrule -A -o yaml > destinationrules.yamlistioctl authn tls-check <pod>.<namespace>
- TLS certificate inspection:
openssl s_client -connect <host>:<port> -showcerts </dev/null > tls_chain_<host>_<port>.txt
- AWS certificate inventory (if applicable):
aws acm list-certificates > acm_certificates.jsonaws acm describe-certificate --certificate-arn <arn> > acm_certificate_detail.json
- GCP certificate inventory (if applicable):
gcloud certificate-manager certificates list --format=json > gcp_certificates.json
Evidence Completeness Rules
- Require at least one artifact per control domain: encryption, mutual auth, cert lifecycle, network restriction, testing.
- Reject artifacts that do not map to specific agent communication paths.
- Mark artifacts stale if they do not reflect current deployment.
Final Assessment Readiness
- Ready only when all agent communication paths have matching cryptographic, identity, and network control evidence.
- Not ready if any path is undocumented or lacks proof of control enforcement.
Output Contract
Return:
context_profilecommunication_control_matrixrequired_artifacts_checklistartifact_generation_stepscommand_templatesevidence_status_matrixassessment_readinessremaining_gaps
Guardrails
- Keep evidence collection non-invasive and read-only by default.
- Request explicit environment scoping before generating commands.
- Flag unmanaged communication channels immediately as high risk.