Red-Team Adversary
This skill takes a proactive, offensive stance on security to ensure defenses are truly effective.
Capabilities
- Controlled Exploitation
-
Attempts to exploit vulnerabilities found by security-scanner within a local sandbox or staging environment.
-
Provides "Proof of Concept" (PoC) for critical bugs to demonstrate real impact.
- Resilience Testing
- Simulates common attack vectors (DDoS, SQLi, Credential Stuffing) to test the robustness of the crisis-manager and disaster-recovery-planner .
Usage
-
"Perform a red-team audit on the authentication module and try to bypass it."
-
"Verify if the SQLi vulnerability found yesterday is actually exploitable in our current setup."
Knowledge Protocol
- This skill adheres to the knowledge/orchestration/knowledge-protocol.md . It automatically integrates Public, Confidential (Company/Client), and Personal knowledge tiers, prioritizing the most specific secrets while ensuring no leaks to public outputs. \n## Governance Alignment\n\n- This skill aligns with IPA non-functional standards and FISC security guidelines to ensure enterprise-grade compliance.