@rfxlamia/skillkit 1.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (225) hide show
  1. package/README.md +16 -0
  2. package/agents/creative-copywriter.md +212 -0
  3. package/agents/dario-amodei.md +135 -0
  4. package/agents/doc-simplifier.md +63 -0
  5. package/agents/kotlin-pro.md +433 -0
  6. package/agents/red-team.md +136 -0
  7. package/agents/sam-altman.md +121 -0
  8. package/agents/seo-manager.md +184 -0
  9. package/bin/skillkit.js +3 -0
  10. package/package.json +35 -0
  11. package/skills/adversarial-review/SKILL.md +219 -0
  12. package/skills/baby-education/SKILL.md +260 -0
  13. package/skills/baby-education/references/advanced-techniques.md +323 -0
  14. package/skills/baby-education/references/transformations.md +345 -0
  15. package/skills/been-there-done-that/SKILL.md +455 -0
  16. package/skills/been-there-done-that/references/analysis-patterns.md +162 -0
  17. package/skills/been-there-done-that/references/git-commands.md +132 -0
  18. package/skills/been-there-done-that/references/tree-insertion-logic.md +145 -0
  19. package/skills/coolhunter/SKILL.md +270 -0
  20. package/skills/coolhunter/assets/elicitation-methods.csv +51 -0
  21. package/skills/coolhunter/knowledge/elicitation-methods.md +312 -0
  22. package/skills/coolhunter/references/workflow-execution.md +238 -0
  23. package/skills/coolhunter/workflow-plan-coolhunter.md +232 -0
  24. package/skills/creative-copywriting/SKILL.md +324 -0
  25. package/skills/creative-copywriting/databases/README.md +60 -0
  26. package/skills/creative-copywriting/databases/carousel-structures.csv +16 -0
  27. package/skills/creative-copywriting/databases/emotional-arcs.csv +11 -0
  28. package/skills/creative-copywriting/databases/hook-formulas.csv +51 -0
  29. package/skills/creative-copywriting/databases/power-words.csv +201 -0
  30. package/skills/creative-copywriting/databases/psychological-triggers.csv +21 -0
  31. package/skills/creative-copywriting/databases/read-more-patterns.csv +26 -0
  32. package/skills/creative-copywriting/databases/swipe-triggers.csv +31 -0
  33. package/skills/creative-copywriting/references/carousel-psychology.md +223 -0
  34. package/skills/creative-copywriting/references/hook-anatomy.md +169 -0
  35. package/skills/creative-copywriting/references/power-word-science.md +134 -0
  36. package/skills/creative-copywriting/references/storytelling-frameworks.md +157 -0
  37. package/skills/diverse-content-gen/SKILL.md +201 -0
  38. package/skills/diverse-content-gen/references/advanced-techniques.md +320 -0
  39. package/skills/diverse-content-gen/references/research-findings.md +379 -0
  40. package/skills/diverse-content-gen/references/task-workflows.md +241 -0
  41. package/skills/diverse-content-gen/references/tool-integration.md +419 -0
  42. package/skills/diverse-content-gen/references/troubleshooting.md +426 -0
  43. package/skills/diverse-content-gen/references/vs-core-technique.md +240 -0
  44. package/skills/framework-critical-thinking/SKILL.md +220 -0
  45. package/skills/framework-critical-thinking/references/bias_detector.md +375 -0
  46. package/skills/framework-critical-thinking/references/fallback_handler.md +239 -0
  47. package/skills/framework-critical-thinking/references/memory_curator.md +161 -0
  48. package/skills/framework-critical-thinking/references/metacognitive_monitor.md +297 -0
  49. package/skills/framework-critical-thinking/references/producer_critic_orchestrator.md +333 -0
  50. package/skills/framework-critical-thinking/references/reasoning_router.md +235 -0
  51. package/skills/framework-critical-thinking/references/reasoning_validator.md +97 -0
  52. package/skills/framework-critical-thinking/references/reflection_trigger.md +78 -0
  53. package/skills/framework-critical-thinking/references/self_verification.md +388 -0
  54. package/skills/framework-critical-thinking/references/uncertainty_quantifier.md +207 -0
  55. package/skills/framework-initiative/SKILL.md +231 -0
  56. package/skills/framework-initiative/references/examples.md +150 -0
  57. package/skills/framework-initiative/references/impact-analysis.md +157 -0
  58. package/skills/framework-initiative/references/intent-patterns.md +145 -0
  59. package/skills/framework-initiative/references/star-framework.md +165 -0
  60. package/skills/humanize-docs/SKILL.md +203 -0
  61. package/skills/humanize-docs/references/advanced-techniques.md +13 -0
  62. package/skills/humanize-docs/references/core-transformations.md +368 -0
  63. package/skills/humanize-docs/references/detection-patterns.md +400 -0
  64. package/skills/humanize-docs/references/examples-gallery.md +374 -0
  65. package/skills/imagine/SKILL.md +190 -0
  66. package/skills/imagine/references/artstyle-corporate-memphis.md +625 -0
  67. package/skills/imagine/references/artstyle-crewdson-hyperrealism.md +295 -0
  68. package/skills/imagine/references/artstyle-iphone-social-media.md +426 -0
  69. package/skills/imagine/references/artstyle-sciencesaru.md +276 -0
  70. package/skills/pre-deploy-checklist/README.md +26 -0
  71. package/skills/pre-deploy-checklist/SKILL.md +153 -0
  72. package/skills/pre-deploy-checklist/references/checklist-categories.md +174 -0
  73. package/skills/pre-deploy-checklist/references/domain-prompts.md +216 -0
  74. package/skills/prompt-engineering/SKILL.md +209 -0
  75. package/skills/prompt-engineering/references/advanced-combinations.md +444 -0
  76. package/skills/prompt-engineering/references/chain-of-thought.md +140 -0
  77. package/skills/prompt-engineering/references/decision_matrix.md +220 -0
  78. package/skills/prompt-engineering/references/few-shot.md +346 -0
  79. package/skills/prompt-engineering/references/json-format.md +270 -0
  80. package/skills/prompt-engineering/references/natural-language.md +420 -0
  81. package/skills/prompt-engineering/references/pitfalls.md +365 -0
  82. package/skills/prompt-engineering/references/prompt-chaining.md +498 -0
  83. package/skills/prompt-engineering/references/react.md +108 -0
  84. package/skills/prompt-engineering/references/self-consistency.md +322 -0
  85. package/skills/prompt-engineering/references/tree-of-thoughts.md +386 -0
  86. package/skills/prompt-engineering/references/xml-format.md +220 -0
  87. package/skills/prompt-engineering/references/yaml-format.md +488 -0
  88. package/skills/prompt-engineering/references/zero-shot.md +74 -0
  89. package/skills/quick-spec/SKILL.md +280 -0
  90. package/skills/quick-spec/assets/tech-spec-template.md +74 -0
  91. package/skills/quick-spec/references/step-01-understand.md +189 -0
  92. package/skills/quick-spec/references/step-02-investigate.md +144 -0
  93. package/skills/quick-spec/references/step-03-generate.md +128 -0
  94. package/skills/quick-spec/references/step-04-review.md +173 -0
  95. package/skills/quick-spec/tests/test_scenarios.md +83 -0
  96. package/skills/quick-spec/tests/test_skill.py +136 -0
  97. package/skills/readme-expert/SKILL.md +538 -0
  98. package/skills/readme-expert/knowledge/INDEX.md +192 -0
  99. package/skills/readme-expert/knowledge/application/quality-standards.md +470 -0
  100. package/skills/readme-expert/knowledge/application/script-executor.md +604 -0
  101. package/skills/readme-expert/knowledge/application/template-library.md +822 -0
  102. package/skills/readme-expert/knowledge/foundation/codebase-scanner.md +361 -0
  103. package/skills/readme-expert/knowledge/foundation/validation-checklist.md +481 -0
  104. package/skills/red-teaming/SKILL.md +321 -0
  105. package/skills/red-teaming/references/ai-llm-redteam.md +517 -0
  106. package/skills/red-teaming/references/attack-techniques.md +410 -0
  107. package/skills/red-teaming/references/cybersecurity-redteam.md +383 -0
  108. package/skills/red-teaming/references/tools-frameworks.md +446 -0
  109. package/skills/releasing/.skillkit-mode +1 -0
  110. package/skills/releasing/SKILL.md +225 -0
  111. package/skills/releasing/references/version-detection.md +108 -0
  112. package/skills/screenwriter/SKILL.md +273 -0
  113. package/skills/screenwriter/references/advanced-techniques.md +216 -0
  114. package/skills/screenwriter/references/pipeline-integration.md +266 -0
  115. package/skills/skillkit/.claude-plugin/plugin.json +27 -0
  116. package/skills/skillkit/CHANGELOG.md +484 -0
  117. package/skills/skillkit/SKILL.md +511 -0
  118. package/skills/skillkit/commands/skillkit.md +6 -0
  119. package/skills/skillkit/commands/validate-plan.md +6 -0
  120. package/skills/skillkit/commands/verify.md +6 -0
  121. package/skills/skillkit/knowledge/INDEX.md +352 -0
  122. package/skills/skillkit/knowledge/application/09-case-studies.md +257 -0
  123. package/skills/skillkit/knowledge/application/10-technical-architecture.md +324 -0
  124. package/skills/skillkit/knowledge/application/11-adoption-strategy.md +267 -0
  125. package/skills/skillkit/knowledge/application/12-testing-and-validation.md +276 -0
  126. package/skills/skillkit/knowledge/application/13-competitive-landscape.md +198 -0
  127. package/skills/skillkit/knowledge/foundation/01-why-skills-exist.md +246 -0
  128. package/skills/skillkit/knowledge/foundation/02-skills-vs-subagents-comparison.md +312 -0
  129. package/skills/skillkit/knowledge/foundation/03-skills-vs-subagents-decision-tree.md +346 -0
  130. package/skills/skillkit/knowledge/foundation/04-hybrid-patterns.md +308 -0
  131. package/skills/skillkit/knowledge/foundation/05-token-economics.md +275 -0
  132. package/skills/skillkit/knowledge/foundation/06-platform-constraints.md +237 -0
  133. package/skills/skillkit/knowledge/foundation/07-security-concerns.md +322 -0
  134. package/skills/skillkit/knowledge/foundation/08-when-not-to-use-skills.md +270 -0
  135. package/skills/skillkit/knowledge/plugin-guide.md +614 -0
  136. package/skills/skillkit/knowledge/tools/14-validation-tools-guide.md +150 -0
  137. package/skills/skillkit/knowledge/tools/15-cost-tools-guide.md +157 -0
  138. package/skills/skillkit/knowledge/tools/16-security-tools-guide.md +122 -0
  139. package/skills/skillkit/knowledge/tools/17-pattern-tools-guide.md +161 -0
  140. package/skills/skillkit/knowledge/tools/18-decision-helper-guide.md +243 -0
  141. package/skills/skillkit/knowledge/tools/19-test-generator-guide.md +275 -0
  142. package/skills/skillkit/knowledge/tools/20-split-skill-guide.md +149 -0
  143. package/skills/skillkit/knowledge/tools/21-quality-scorer-guide.md +226 -0
  144. package/skills/skillkit/knowledge/tools/22-migration-helper-guide.md +356 -0
  145. package/skills/skillkit/knowledge/tools/23-subagent-creation-guide.md +448 -0
  146. package/skills/skillkit/knowledge/tools/24-behavioral-testing-guide.md +122 -0
  147. package/skills/skillkit/references/proposal-generation.md +982 -0
  148. package/skills/skillkit/references/rationalization-catalog.md +75 -0
  149. package/skills/skillkit/references/research-methodology.md +661 -0
  150. package/skills/skillkit/references/section-2-full-creation-workflow.md +452 -0
  151. package/skills/skillkit/references/section-3-validation-workflow-existing-skill.md +63 -0
  152. package/skills/skillkit/references/section-4-decision-workflow-skills-vs-subagents.md +64 -0
  153. package/skills/skillkit/references/section-5-migration-workflow-doc-to-skill.md +58 -0
  154. package/skills/skillkit/references/section-6-subagent-creation-workflow.md +499 -0
  155. package/skills/skillkit/references/section-7-knowledge-reference-map.md +72 -0
  156. package/skills/skillkit/scripts/decision_helper.py +799 -0
  157. package/skills/skillkit/scripts/init_skill.py +400 -0
  158. package/skills/skillkit/scripts/init_subagent.py +231 -0
  159. package/skills/skillkit/scripts/migration_helper.py +669 -0
  160. package/skills/skillkit/scripts/package_skill.py +211 -0
  161. package/skills/skillkit/scripts/pattern_detector.py +381 -0
  162. package/skills/skillkit/scripts/pattern_detector_new.py +382 -0
  163. package/skills/skillkit/scripts/pressure_tester.py +157 -0
  164. package/skills/skillkit/scripts/quality_scorer.py +999 -0
  165. package/skills/skillkit/scripts/quick_validate.py +100 -0
  166. package/skills/skillkit/scripts/security_scanner.py +474 -0
  167. package/skills/skillkit/scripts/split_skill.py +540 -0
  168. package/skills/skillkit/scripts/test_generator.py +695 -0
  169. package/skills/skillkit/scripts/token_estimator.py +493 -0
  170. package/skills/skillkit/scripts/utils/__init__.py +49 -0
  171. package/skills/skillkit/scripts/utils/budget_tracker.py +388 -0
  172. package/skills/skillkit/scripts/utils/output_formatter.py +263 -0
  173. package/skills/skillkit/scripts/utils/reference_validator.py +401 -0
  174. package/skills/skillkit/scripts/validate_skill.py +594 -0
  175. package/skills/skillkit/tests/test_behavioral.py +39 -0
  176. package/skills/skillkit/tests/test_scenarios.md +83 -0
  177. package/skills/skillkit/tests/test_skill.py +136 -0
  178. package/skills/social-media-seo/SKILL.md +278 -0
  179. package/skills/social-media-seo/databases/caption-styles.csv +31 -0
  180. package/skills/social-media-seo/databases/engagement-tactics.csv +16 -0
  181. package/skills/social-media-seo/databases/hashtag-strategies.csv +21 -0
  182. package/skills/social-media-seo/databases/hook-formulas.csv +26 -0
  183. package/skills/social-media-seo/databases/keyword-clusters.csv +11 -0
  184. package/skills/social-media-seo/databases/thread-structures.csv +26 -0
  185. package/skills/social-media-seo/databases/viral-patterns.csv +21 -0
  186. package/skills/social-media-seo/references/analytics-guide.md +321 -0
  187. package/skills/social-media-seo/references/instagram-seo.md +235 -0
  188. package/skills/social-media-seo/references/threads-seo.md +305 -0
  189. package/skills/social-media-seo/references/x-twitter-seo.md +337 -0
  190. package/skills/social-media-seo/scripts/query_database.py +191 -0
  191. package/skills/storyteller/SKILL.md +241 -0
  192. package/skills/storyteller/references/transformation-methodology.md +293 -0
  193. package/skills/storyteller/references/visual-vocabulary.md +177 -0
  194. package/skills/thread-pro/SKILL.md +162 -0
  195. package/skills/thread-pro/anti-ai-patterns.md +120 -0
  196. package/skills/thread-pro/hook-formulas.md +138 -0
  197. package/skills/thread-pro/references/anti-ai-patterns.md +120 -0
  198. package/skills/thread-pro/references/hook-formulas.md +138 -0
  199. package/skills/thread-pro/references/thread-structures.md +240 -0
  200. package/skills/thread-pro/references/voice-injection.md +130 -0
  201. package/skills/thread-pro/thread-structures.md +240 -0
  202. package/skills/thread-pro/voice-injection.md +130 -0
  203. package/skills/tinkering/SKILL.md +251 -0
  204. package/skills/tinkering/references/graduation-checklist.md +100 -0
  205. package/skills/validate-plan/.skillkit-mode +1 -0
  206. package/skills/validate-plan/SKILL.md +406 -0
  207. package/skills/validate-plan/references/dry-principles.md +251 -0
  208. package/skills/validate-plan/references/gap-analysis-guide.md +320 -0
  209. package/skills/validate-plan/references/tdd-patterns.md +413 -0
  210. package/skills/validate-plan/references/yagni-checklist.md +330 -0
  211. package/skills/verify-before-ship/.skillkit-mode +1 -0
  212. package/skills/verify-before-ship/SKILL.md +116 -0
  213. package/skills/verify-before-ship/references/anti-rationalization.md +212 -0
  214. package/skills/verify-before-ship/references/verification-gates.md +305 -0
  215. package/skills-manifest.json +217 -0
  216. package/src/banner.js +10 -0
  217. package/src/cli.js +30 -0
  218. package/src/install.js +53 -0
  219. package/src/install.test.js +40 -0
  220. package/src/picker.js +74 -0
  221. package/src/picker.test.js +21 -0
  222. package/src/scope.js +57 -0
  223. package/src/scope.test.js +19 -0
  224. package/src/update.js +34 -0
  225. package/src/update.test.js +24 -0
@@ -0,0 +1,321 @@
1
+ ---
2
+ name: red-teaming
3
+ description: Comprehensive red teaming methodology for both cybersecurity and AI/LLM systems. Use when conducting adversary emulation, vulnerability assessment, attack simulation, or security validation. Trigger on requests for penetration testing, threat modeling, security audits, MITRE ATT&CK operations, LLM safety testing, prompt injection attacks, or compliance validation (OWASP, NIST, TIBER, DORA, EU AI Act). Apply when users ask to "test like an attacker", "red team our system", "validate security posture", "assess LLM vulnerabilities", or "simulate cyber attacks". Includes planning frameworks, execution strategies, reporting templates, and progressive references to specialized attack techniques and tools.
4
+ category: security
5
+ ---
6
+
7
+ # Red Teaming
8
+
9
+ ## Overview
10
+
11
+ Red teaming is a structured adversarial approach to testing organizational security posture by simulating real-world attacks. This skill provides comprehensive methodology for both **traditional cybersecurity red teaming** (network, physical, social engineering) and **AI/LLM red teaming** (prompt injection, jailbreaking, safety testing).
12
+
13
+ **Core Philosophy:** Think like an attacker, operate covertly, test holistically, document thoroughly.
14
+
15
+ ## When to Use This Skill
16
+
17
+ Use this skill when users need:
18
+
19
+ ### Cybersecurity Red Teaming
20
+ - **Adversary emulation** using MITRE ATT&CK framework
21
+ - **Network penetration testing** beyond traditional pen tests
22
+ - **Purple team exercises** (red-blue collaboration)
23
+ - **Security posture validation** before major deployments
24
+ - **Compliance testing** for TIBER, DORA, ISO 27001
25
+ - **Physical security assessment** and social engineering
26
+ - **Incident response readiness** testing
27
+
28
+ ### AI/LLM Red Teaming
29
+ - **LLM safety validation** before production deployment
30
+ - **Prompt injection vulnerability** assessment
31
+ - **Jailbreaking resistance** testing
32
+ - **Data leakage detection** (PII, training data)
33
+ - **Bias and toxicity evaluation**
34
+ - **Multi-turn attack simulation**
35
+ - **Compliance validation** for OWASP Top 10 LLM, NIST AI RMF, EU AI Act
36
+
37
+ ### Key Indicators to Use This Skill
38
+ - "Test our security like a real attacker"
39
+ - "MITRE ATT&CK" or "adversary emulation"
40
+ - "LLM red teaming" or "prompt injection testing"
41
+ - "Purple team exercise"
42
+ - "Security audit" (holistic vs. point-in-time)
43
+ - "Jailbreak our AI model"
44
+
45
+ ## Red Teaming Fundamentals
46
+
47
+ ### Red Team vs. Other Security Approaches
48
+
49
+ | Aspect | Red Teaming | Penetration Testing | Vulnerability Assessment |
50
+ |--------|-------------|---------------------|-------------------------|
51
+ | **Scope** | Holistic, goal-oriented | Technical, scope-limited | Automated scanning |
52
+ | **Approach** | Covert, realistic attack | Overt testing | Compliance-driven |
53
+ | **Duration** | Weeks-months | Days-weeks | Hours-days |
54
+ | **Objective** | Compromise organization | Find vulnerabilities | Identify weaknesses |
55
+ | **Detection** | Avoid detection | Detection acceptable | N/A |
56
+ | **Focus** | People + Process + Technology | Technology only | Technology only |
57
+
58
+ ### Core Principles
59
+
60
+ 1. **Realistic Threat Modeling**
61
+ - Base scenarios on actual threat actors relevant to industry
62
+ - Use Tactics, Techniques, Procedures (TTPs) over specific tools
63
+ - Emulate adversary behavior patterns, not just exploit signatures
64
+
65
+ 2. **Adversarial Mindset**
66
+ - Think like an attacker: creative, patient, opportunistic
67
+ - Exploit human factors, not just technical vulnerabilities
68
+ - Chain multiple small weaknesses into critical impact
69
+
70
+ 3. **Stealth Operations**
71
+ - Avoid detection by security tools and personnel
72
+ - Use living-off-the-land techniques
73
+ - Gradual escalation to avoid triggering alarms
74
+
75
+ 4. **Comprehensive Testing**
76
+ - Test all attack surfaces: physical, digital, human
77
+ - Multi-vector approach (not single exploit chains)
78
+ - Test detection AND response capabilities
79
+
80
+ 5. **Evidence-Based Reporting**
81
+ - Document every step with screenshots, logs, timestamps
82
+ - Provide proof of exploitation, not just theoretical risks
83
+ - Actionable remediation recommendations
84
+
85
+ 6. **Ethical Boundaries**
86
+ - Operate within rules of engagement
87
+ - Obtain proper authorization
88
+ - Avoid collateral damage to business operations
89
+
90
+ ## Universal Red Teaming Methodology
91
+
92
+ All red team engagements follow this core process, adapted for cybersecurity or AI domains:
93
+
94
+ ### Phase 1: Planning
95
+
96
+ **Objective:** Define scope, objectives, rules of engagement
97
+
98
+ **Key Activities:**
99
+ - **Scope Definition**
100
+ - Target systems, networks, applications
101
+ - In-scope vs. out-of-scope boundaries
102
+ - Time constraints and testing windows
103
+
104
+ - **Objectives & Goals**
105
+ - What are we trying to compromise? (data, access, control)
106
+ - Success criteria (e.g., "exfiltrate customer database", "bypass AI safety filters")
107
+ - Realistic vs. theoretical scenarios
108
+
109
+ - **Threat Modeling**
110
+ - Identify relevant threat actors (APT groups, insider threats, etc.)
111
+ - Map threat landscape to organizational risk profile
112
+ - Select TTPs to emulate (MITRE ATT&CK for cyber, OWASP for AI)
113
+
114
+ - **Rules of Engagement**
115
+ - Authorization documentation
116
+ - Restricted actions (e.g., no DoS, no data destruction)
117
+ - Escalation procedures
118
+ - Communication protocols
119
+ - Legal and compliance requirements
120
+
121
+ - **Team Assembly**
122
+ - Red team members and specializations
123
+ - Blue team awareness (known vs. unknown exercise)
124
+ - White cell coordination (exercise management)
125
+
126
+ **Deliverable:** Red team operation plan with objectives, scope, rules, timeline
127
+
128
+ ### Phase 2: Reconnaissance & Intelligence Gathering
129
+
130
+ **Objective:** Collect information about target without detection
131
+
132
+ **Key Activities:**
133
+ - **Open-Source Intelligence (OSINT)**
134
+ - Public records, social media, company websites
135
+ - Technology stack identification
136
+ - Employee information and organizational structure
137
+ - For AI: Model documentation, API specifications, training data sources
138
+
139
+ - **Technical Reconnaissance**
140
+ - Network mapping and asset discovery
141
+ - Subdomain enumeration and infrastructure fingerprinting
142
+ - For AI: Endpoint testing, model architecture inference
143
+
144
+ - **Social Intelligence**
145
+ - Employee behavior patterns
146
+ - Communication channels and workflows
147
+ - Physical security observations
148
+
149
+ **Deliverable:** Intelligence dossier with target information and attack surface map
150
+
151
+ ### Phase 3: Attack Execution
152
+
153
+ **Objective:** Exploit identified weaknesses to achieve objectives
154
+
155
+ **Key Activities:**
156
+ - **Initial Access**
157
+ - Exploit vulnerabilities in perimeter defenses
158
+ - Phishing, social engineering, or physical intrusion
159
+ - For AI: Prompt injection, API abuse
160
+
161
+ - **Establish Persistence**
162
+ - Install backdoors and command & control (C2)
163
+ - Create alternative access methods
164
+ - For AI: Inject persistent instructions, poison context
165
+
166
+ - **Privilege Escalation**
167
+ - Exploit local vulnerabilities
168
+ - Credential theft and lateral movement
169
+ - For AI: Escalate from user to system-level control
170
+
171
+ - **Goal Achievement**
172
+ - Data exfiltration, system compromise, or other objectives
173
+ - Maintain stealth throughout operation
174
+
175
+ - **Clean-up & Evidence Collection**
176
+ - Document all actions with evidence
177
+ - Remove traces if required (or leave for blue team training)
178
+
179
+ **Deliverable:** Exploitation evidence with step-by-step attack chain documentation
180
+
181
+ ### Phase 4: Reporting & Debriefing
182
+
183
+ **Objective:** Communicate findings and provide actionable recommendations
184
+
185
+ **Key Activities:**
186
+ - **Comprehensive Report**
187
+ - Executive summary (business impact, risk levels)
188
+ - Technical findings (vulnerabilities exploited, attack paths)
189
+ - Evidence (screenshots, logs, PoC code)
190
+ - Remediation recommendations (prioritized by risk)
191
+
192
+ - **Presentation & Debriefing**
193
+ - Present findings to stakeholders
194
+ - Demonstrate attack techniques (if safe)
195
+ - Answer questions and provide clarifications
196
+
197
+ - **Blue Team Collaboration**
198
+ - Share indicators of compromise (IOCs)
199
+ - Discuss detection gaps and improvements
200
+ - Purple team knowledge transfer
201
+
202
+ **Deliverable:** Final red team report with findings, evidence, and remediation roadmap
203
+
204
+ ## Best Practices
205
+
206
+ ### Planning Phase
207
+ - **Understand Business Context**: Align testing with business priorities and risk tolerance
208
+ - **Set Clear Success Criteria**: Define measurable objectives before starting
209
+ - **Document Everything**: Authorization, scope, rules of engagement must be in writing
210
+
211
+ ### Execution Phase
212
+ - **Start Low & Slow**: Gradual reconnaissance avoids detection
213
+ - **Diversify Attack Vectors**: Don't rely on single technique
214
+ - **Monitor Blue Team Response**: Evaluate detection and response capabilities
215
+ - **Maintain Operational Security**: Protect red team infrastructure and tactics
216
+
217
+ ### Reporting Phase
218
+ - **Prioritize Findings**: Focus on business impact, not technical severity alone
219
+ - **Provide Context**: Explain realistic attack scenarios, not just theoretical risks
220
+ - **Actionable Recommendations**: Give specific, implementable remediation steps
221
+ - **Celebrate Wins**: Acknowledge effective defenses alongside vulnerabilities
222
+
223
+ ### Organizational Culture
224
+ - **No Blame Culture**: Red teaming is learning, not punishment
225
+ - **Continuous Improvement**: Regular exercises (quarterly or bi-annually)
226
+ - **Purple Team Collaboration**: Break down red-blue silos
227
+ - **Executive Buy-In**: Ensure leadership understands value and supports findings
228
+
229
+ ## Progressive Disclosure: Domain-Specific Guidance
230
+
231
+ This skill uses progressive disclosure to manage complexity. Core methodology above applies universally. For domain-specific techniques, reference these files:
232
+
233
+ ### Cybersecurity Red Teaming (P1)
234
+ **File:** [references/cybersecurity-redteam.md](references/cybersecurity-redteam.md)
235
+ **Contents:**
236
+ - MITRE ATT&CK framework integration
237
+ - 7-phase cybersecurity methodology (detailed)
238
+ - Network penetration techniques
239
+ - Social engineering tactics
240
+ - Physical security testing
241
+ - Purple team practices
242
+ - Tools: Atomic Red Team, CALDERA, Metasploit
243
+
244
+ ### AI/LLM Red Teaming (P1)
245
+ **File:** [references/ai-llm-redteam.md](references/ai-llm-redteam.md)
246
+ **Contents:**
247
+ - LLM vulnerability assessment (OWASP Top 10 LLM)
248
+ - Prompt injection attack techniques
249
+ - Jailbreaking strategies
250
+ - Multi-turn attack simulation
251
+ - Evaluation methodologies (scoring, metrics)
252
+ - Compliance: NIST AI RMF, EU AI Act
253
+ - Tools: DeepTeam, Promptfoo, custom frameworks
254
+
255
+ ### Attack Techniques Library (P2)
256
+ **File:** [references/attack-techniques.md](references/attack-techniques.md)
257
+ **Contents:**
258
+ - Comprehensive attack technique taxonomy
259
+ - Cybersecurity: MITRE ATT&CK techniques mapped
260
+ - AI/LLM: 20+ prompt injection techniques
261
+ - Social engineering patterns
262
+ - Physical intrusion methods
263
+ - Evasion and anti-forensics
264
+
265
+ ### Tools & Frameworks (P2)
266
+ **File:** [references/tools-frameworks.md](references/tools-frameworks.md)
267
+ **Contents:**
268
+ - MITRE ATT&CK Navigator
269
+ - Atomic Red Team & CALDERA
270
+ - LLM red teaming frameworks (DeepTeam, Promptfoo)
271
+ - C2 frameworks (Cobalt Strike, Sliver)
272
+ - OSINT tools (Shodan, theHarvester)
273
+ - Evaluation platforms
274
+
275
+ ## Critical Reminders
276
+
277
+ - **Authorization is Mandatory**: Never conduct red team operations without explicit written authorization
278
+ - **Respect Rules of Engagement**: Stay within defined boundaries to avoid legal/ethical issues
279
+ - **Document Everything**: Comprehensive documentation is essential for learning and compliance
280
+ - **Think Like an Attacker**: Creative, patient, and opportunistic mindset
281
+ - **Test Detection AND Response**: Don't just breach—evaluate how organization responds
282
+ - **Prioritize Business Impact**: Focus on realistic threats, not just technical curiosities
283
+ - **Collaborate with Blue Team**: Knowledge transfer accelerates organizational learning
284
+ - **Continuous Evolution**: Red teaming is not one-time; threats evolve, so must testing
285
+
286
+ ## When NOT to Use This Skill
287
+
288
+ This skill is NOT appropriate for:
289
+ - **Simple vulnerability scanning** → Use automated scanners
290
+ - **Compliance checklists** → Use audit frameworks
291
+ - **Bug bounty hunting** → Use bug bounty methodologies
292
+ - **Incident response** → Use IR playbooks (though red team findings inform IR)
293
+ - **Production monitoring** → Use SOC/SIEM tools
294
+
295
+ ## Quality Standards
296
+
297
+ Effective red team operations must:
298
+ - ✅ Align with realistic threat scenarios
299
+ - ✅ Operate covertly within rules of engagement
300
+ - ✅ Document comprehensive evidence trail
301
+ - ✅ Provide actionable remediation recommendations
302
+ - ✅ Test both detection AND response capabilities
303
+ - ✅ Deliver value through organizational learning
304
+
305
+ ## Integration with Other Skills
306
+
307
+ This skill complements:
308
+ - **Research skill**: Threat intelligence gathering, OSINT
309
+ - **Skillkit**: If creating custom red team tools or frameworks
310
+ - **Frontend-design**: If testing web application security
311
+ - **Arch-v/Imagine**: If documenting attack scenarios visually
312
+
313
+ ## References
314
+
315
+ For deeper domain expertise, always refer to the progressive disclosure files:
316
+ 1. **Cybersecurity**: `references/cybersecurity-redteam.md`
317
+ 2. **AI/LLM**: `references/ai-llm-redteam.md`
318
+ 3. **Attack Techniques**: `references/attack-techniques.md`
319
+ 4. **Tools**: `references/tools-frameworks.md`
320
+
321
+ These references provide the technical depth needed for specialized red team operations while keeping this core methodology concise and actionable.