red-team-adversary

SKILL.md

Red-Team Adversary

This skill takes a proactive, offensive stance on security to ensure defenses are truly effective.

Capabilities

1. Controlled Exploitation

  • Attempts to exploit vulnerabilities found by security-scanner within a local sandbox or staging environment.
  • Provides "Proof of Concept" (PoC) for critical bugs to demonstrate real impact.

2. Resilience Testing

  • Simulates common attack vectors (DDoS, SQLi, Credential Stuffing) to test the robustness of the crisis-manager and disaster-recovery-planner.

Usage

  • "Perform a red-team audit on the authentication module and try to bypass it."
  • "Verify if the SQLi vulnerability found yesterday is actually exploitable in our current setup."

Knowledge Protocol

  • This skill adheres to the knowledge/orchestration/knowledge-protocol.md. It automatically integrates Public, Confidential (Company/Client), and Personal knowledge tiers, prioritizing the most specific secrets while ensuring no leaks to public outputs. \n## Governance Alignment\n\n- This skill aligns with IPA non-functional standards and FISC security guidelines to ensure enterprise-grade compliance.
Weekly Installs
9
GitHub Stars
1
First Seen
Feb 13, 2026
Installed on
cursor8
claude-code8
replit8
codex8
mcpjam7
iflow-cli7