red-team-adversary
SKILL.md
Red-Team Adversary
This skill takes a proactive, offensive stance on security to ensure defenses are truly effective.
Capabilities
1. Controlled Exploitation
- Attempts to exploit vulnerabilities found by
security-scannerwithin a local sandbox or staging environment. - Provides "Proof of Concept" (PoC) for critical bugs to demonstrate real impact.
2. Resilience Testing
- Simulates common attack vectors (DDoS, SQLi, Credential Stuffing) to test the robustness of the
crisis-manageranddisaster-recovery-planner.
Usage
- "Perform a red-team audit on the authentication module and try to bypass it."
- "Verify if the SQLi vulnerability found yesterday is actually exploitable in our current setup."
Knowledge Protocol
- This skill adheres to the
knowledge/orchestration/knowledge-protocol.md. It automatically integrates Public, Confidential (Company/Client), and Personal knowledge tiers, prioritizing the most specific secrets while ensuring no leaks to public outputs. \n## Governance Alignment\n\n- This skill aligns with IPA non-functional standards and FISC security guidelines to ensure enterprise-grade compliance.
Weekly Installs
9
Repository
famaoai-creator…i-skillsGitHub Stars
1
First Seen
Feb 13, 2026
Security Audits
Installed on
cursor8
claude-code8
replit8
codex8
mcpjam7
iflow-cli7