WorldThreatModelHarness
World Threat Model Harness
A system of 11 persistent world models spanning 6 months to 50 years. Each model is a deep (~10 page) analysis of geopolitics, technology, economics, society, environment, security, and wildcards for that time horizon. Ideas, strategies, and investments are tested against ALL horizons simultaneously using adversarial analysis (RedTeam, FirstPrinciples, Council).
Workflow Routing
| Trigger | Workflow | Description |
|---|---|---|
| "test idea", "test strategy", "test investment", "how will this hold up", "stress test", "test against future" | Workflows/TestIdea.md |
Test any input against all 11 world models |
| "update world model", "update models", "refresh models", "new analysis" | Workflows/UpdateModels.md |
Refresh world model content with new research/analysis |
| "view world model", "show models", "current models", "model status" | Workflows/ViewModels.md |
Read and summarize current world model state |
Tier System
All workflows support three execution tiers:
| Tier | Target Time | Strategy | When to Use |
|---|---|---|---|
| Fast | ~2 min | Single agent synthesizes across all models | Quick gut-check, casual exploration |
| Standard | ~10 min | 11 parallel agents + RedTeam + FirstPrinciples | Most use cases, good depth/speed balance |
| Deep | Up to 1 hr | 11 parallel agents + per-horizon Research + RedTeam + Council + FirstPrinciples | High-stakes decisions, major investments |
Default tier: Standard. User specifies with "fast", "deep", or tier defaults to Standard.
World Model Storage
Models are stored at: $PAI_DIR/MEMORY/RESEARCH/WorldModels/
| File | Horizon |
|---|---|
INDEX.md |
Summary of all models with last-updated dates |
6-month.md |
6-month outlook |
1-year.md |
1-year outlook |
2-year.md |
2-year outlook |
3-year.md |
3-year outlook |
5-year.md |
5-year outlook |
7-year.md |
7-year outlook |
10-year.md |
10-year outlook |
15-year.md |
15-year outlook |
20-year.md |
20-year outlook |
30-year.md |
30-year outlook |
50-year.md |
50-year outlook |
Context Files
| File | Purpose |
|---|---|
ModelTemplate.md |
Template structure for world model documents |
OutputFormat.md |
Template for TestIdea results output |
Skill Integrations
This skill orchestrates multiple PAI capabilities:
- RedTeam — Adversarial stress testing of ideas against each horizon
- FirstPrinciples — Decompose idea assumptions into hard/soft/assumption constraints
- Council — Multi-perspective debate on idea viability across horizons
- Research — Deep research for model creation and updates
Voice Notification
Before any workflow execution:
curl -s -X POST http://localhost:8888/notify \
-H "Content-Type: application/json" \
-d '{"message": "Running WORKFLOW_NAME in the World Threat Model Harness", "voice_id": "fTtv3eikoepIosk8dTZ5"}'
Customization Check
Before execution, check for user customizations at:
~/.claude/PAI/USER/SKILLCUSTOMIZATIONS/WorldThreatModelHarness/
More from danielmiessler/personal_ai_infrastructure
osint
Structured OSINT investigations — people lookup, company intel, investment due diligence, entity/threat intel, domain recon, organization research using public sources with ethical authorization framework. USE WHEN OSINT, due diligence, background check, research person, company intel, investigate, company lookup, domain lookup, entity lookup, organization lookup, threat intel, discover OSINT sources.
263firstprinciples
Physics-based reasoning framework (Musk/Elon methodology) that deconstructs problems to irreducible fundamental truths rather than reasoning by analogy. Three-step structure: DECONSTRUCT (break to constituent parts and actual values), CHALLENGE (classify every element as hard constraint / soft constraint / unvalidated assumption — only physics is truly immutable), RECONSTRUCT (build optimal solution from fundamentals alone, ignoring inherited form). Outputs: constituent-parts breakdown, constraint classification table, and reconstructed solution with key insight. Three workflows: Deconstruct.md, Challenge.md, Reconstruct.md. Integrates with RedTeam (attack assumptions before deploying adversarial agents), Security (decompose threat model), Architecture (challenge design constraints), and Pentesters (decompose assumed security boundaries). Other skills invoke via: Challenge on all stated constraints → classify as hard/soft/assumption. Cross-domain synthesis: solutions from unrelated fields often apply once the fundamental truths are exposed. NOT FOR incident investigation and causal chains (use RootCauseAnalysis). NOT FOR structural feedback loops (use SystemsThinking). USE WHEN first principles, fundamental truths, challenge assumptions, is this a real constraint, rebuild from scratch, what are we actually paying for, what is this really made of, start over, physics first, question everything, reasoning by analogy, is this really necessary.
162documents
Read, write, convert, and analyze documents — routes to PDF, DOCX, XLSX, PPTX sub-skills for creation, editing, extraction, and format conversion. USE WHEN document, process file, create document, convert format, extract text, PDF, DOCX, XLSX, PPTX, Word, Excel, spreadsheet, PowerPoint, presentation, slides, consulting report, large PDF, merge PDF, fill form, tracked changes, redlining.
116redteam
Military-grade adversarial analysis that deploys 32 parallel expert agents (engineers, architects, pentesters, interns) to stress-test ideas, strategies, and plans — not systems or infrastructure. Two workflows: ParallelAnalysis (5-phase: decompose into 24 atomic claims → 32-agent parallel attack → synthesis → steelman → counter-argument, each 8 points) and AdversarialValidation (competing proposals synthesized into best solution). Context files: Philosophy.md (core principles, success criteria, agent types), Integration.md (how to combine with FirstPrinciples, Council, and other skills; output format). Targets arguments, not network vulnerabilities. Findings ranked by severity; goal is to strengthen, not destroy — weaknesses delivered with remediation paths. Collaborates with FirstPrinciples (decompose assumptions before attacking) and Council (Council debates to find paths; RedTeam attacks whatever survives). Also invoked internally by Ideate (TEST phase) and WorldThreatModel (horizon stress-testing). NOT FOR AI instruction set auditing (use BitterPillEngineering). NOT FOR network/system vulnerability testing (use a security assessment skill). USE WHEN red team, attack idea, counterarguments, critique, stress test, devil's advocate, find weaknesses, break this, poke holes, what could go wrong, strongest objection, adversarial validation, battle of bots.
115privateinvestigator
Ethical people-finding using 15 parallel research agents (45 search threads) across public records, social media, reverse lookups. Public data only, no pretexting. USE WHEN find person, locate, reconnect, people search, skip trace, reverse lookup, social media search, public records search, verify identity.
114council
Multi-agent collaborative debate that produces visible round-by-round transcripts with genuine intellectual friction. All council members are custom-composed via ComposeAgent (Agents skill) with domain expertise, unique voice, and personality tailored to the specific topic — never built-in generic types. ComposeAgent invoked as: bun run ~/.claude/skills/Agents/Tools/ComposeAgent.ts. Two workflows: DEBATE (3 rounds, full transcript + synthesis, parallel execution within rounds, 40-90 seconds total) and QUICK (1 round, fast perspective check). Context files: CouncilMembers.md (agent composition instructions), RoundStructure.md (three-round structure and timing), OutputFormat.md (transcript format templates). Agents are designed per debate topic to create real disagreement; 4-6 well-composed agents outperform 12 generic ones. Council is collaborative-adversarial (debate to find best path); for pure adversarial attack on an idea, use RedTeam instead. NOT FOR parallel task execution across agents (use Delegation skill). USE WHEN council, debate, multiple perspectives, weigh options, deliberate, get different views, multi-agent discussion, what would experts say, is there consensus, pros and cons from multiple angles.
113