@vantagesec/socc 0.1.13 → 0.1.15
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +8 -8
- package/dist/cli.mjs +10734 -10807
- package/package.json +7 -8
- package/scripts/bootstrap-socc-soul.mjs +23 -1
- package/socc-canonical/.agents/generated/socc-agent-manifest.json +0 -231
- package/socc-canonical/.agents/generated/socc-agent.md +0 -256
- package/socc-canonical/.agents/rules/AGENT.md +0 -109
- package/socc-canonical/.agents/rules/AQL_REFERENCE.md +0 -40
- package/socc-canonical/.agents/rules/MEMORY.md +0 -19
- package/socc-canonical/.agents/rules/TOOLS.md +0 -48
- package/socc-canonical/.agents/soc-copilot/AGENTS.md +0 -28
- package/socc-canonical/.agents/soc-copilot/MEMORY.md +0 -20
- package/socc-canonical/.agents/soc-copilot/SKILL.md +0 -51
- package/socc-canonical/.agents/soc-copilot/SOUL.md +0 -31
- package/socc-canonical/.agents/soc-copilot/TOOLS.md +0 -33
- package/socc-canonical/.agents/soc-copilot/USER.md +0 -31
- package/socc-canonical/.agents/soc-copilot/identity.md +0 -7
- package/socc-canonical/.agents/soc-copilot/references/evidence-rules.md +0 -30
- package/socc-canonical/.agents/soc-copilot/references/intelligence-source-registry.md +0 -32
- package/socc-canonical/.agents/soc-copilot/references/ioc-extraction.md +0 -25
- package/socc-canonical/.agents/soc-copilot/references/knowledge-ingestion-policy.md +0 -34
- package/socc-canonical/.agents/soc-copilot/references/mitre-guidance.md +0 -21
- package/socc-canonical/.agents/soc-copilot/references/output-contract.md +0 -31
- package/socc-canonical/.agents/soc-copilot/references/security-json-patterns.md +0 -129
- package/socc-canonical/.agents/soc-copilot/references/telemetry-investigation-patterns.md +0 -39
- package/socc-canonical/.agents/soc-copilot/schemas/analysis_response.json +0 -119
- package/socc-canonical/.agents/soc-copilot/skills/code-review-excellence/SKILL.md +0 -538
- package/socc-canonical/.agents/soc-copilot/skills/cybersecurity-analyst/QUICK_REFERENCE.md +0 -263
- package/socc-canonical/.agents/soc-copilot/skills/cybersecurity-analyst/README.md +0 -243
- package/socc-canonical/.agents/soc-copilot/skills/cybersecurity-analyst/SKILL.md +0 -1707
- package/socc-canonical/.agents/soc-copilot/skills/cybersecurity-analyst/tests/quiz.md +0 -472
- package/socc-canonical/.agents/soc-copilot/skills/data-visualization/SKILL.md +0 -304
- package/socc-canonical/.agents/soc-copilot/skills/deep-research/SKILL.md +0 -192
- package/socc-canonical/.agents/soc-copilot/skills/excel-analysis/SKILL.md +0 -247
- package/socc-canonical/.agents/soc-copilot/skills/find-skills/SKILL.md +0 -133
- package/socc-canonical/.agents/soc-copilot/skills/humanizer/README.md +0 -120
- package/socc-canonical/.agents/soc-copilot/skills/humanizer/SKILL.md +0 -439
- package/socc-canonical/.agents/soc-copilot/skills/malware-behavior/SKILL.md +0 -54
- package/socc-canonical/.agents/soc-copilot/skills/mitre/SKILL.md +0 -200
- package/socc-canonical/.agents/soc-copilot/skills/observability-logs-search/SKILL.md +0 -237
- package/socc-canonical/.agents/soc-copilot/skills/observability-logs-search/references/log-search-reference.md +0 -76
- package/socc-canonical/.agents/soc-copilot/skills/payload-triage/SKILL.md +0 -53
- package/socc-canonical/.agents/soc-copilot/skills/phishing-analysis/SKILL.md +0 -51
- package/socc-canonical/.agents/soc-copilot/skills/prd/SKILL.md +0 -143
- package/socc-canonical/.agents/soc-copilot/skills/remembering-conversations/MCP-TOOLS.md +0 -137
- package/socc-canonical/.agents/soc-copilot/skills/remembering-conversations/SKILL.md +0 -65
- package/socc-canonical/.agents/soc-copilot/skills/sequential-thinking/README.md +0 -118
- package/socc-canonical/.agents/soc-copilot/skills/sequential-thinking/SKILL.md +0 -93
- package/socc-canonical/.agents/soc-copilot/skills/sequential-thinking/references/advanced.md +0 -122
- package/socc-canonical/.agents/soc-copilot/skills/sequential-thinking/references/examples.md +0 -274
- package/socc-canonical/.agents/soc-copilot/skills/soc-generalist/SKILL.md +0 -53
- package/socc-canonical/.agents/soc-copilot/skills/suspicious-url/SKILL.md +0 -51
- package/socc-canonical/.agents/soc-copilot/skills/systematic-debugging/CREATION-LOG.md +0 -119
- package/socc-canonical/.agents/soc-copilot/skills/systematic-debugging/SKILL.md +0 -296
- package/socc-canonical/.agents/soc-copilot/skills/systematic-debugging/condition-based-waiting-example.ts +0 -158
- package/socc-canonical/.agents/soc-copilot/skills/systematic-debugging/condition-based-waiting.md +0 -115
- package/socc-canonical/.agents/soc-copilot/skills/systematic-debugging/defense-in-depth.md +0 -122
- package/socc-canonical/.agents/soc-copilot/skills/systematic-debugging/find-polluter.sh +0 -63
- package/socc-canonical/.agents/soc-copilot/skills/systematic-debugging/root-cause-tracing.md +0 -169
- package/socc-canonical/.agents/soc-copilot/skills/systematic-debugging/test-academic.md +0 -14
- package/socc-canonical/.agents/soc-copilot/skills/systematic-debugging/test-pressure-1.md +0 -58
- package/socc-canonical/.agents/soc-copilot/skills/systematic-debugging/test-pressure-2.md +0 -68
- package/socc-canonical/.agents/soc-copilot/skills/systematic-debugging/test-pressure-3.md +0 -69
- package/socc-canonical/.agents/soc-copilot/skills/translation-expertise/SKILL.md +0 -284
- package/socc-canonical/.agents/soc-copilot/skills/translation-expertise/chinese-traditional.md +0 -535
- package/socc-canonical/.agents/soc-copilot/skills/translation-expertise/english.md +0 -372
- package/socc-canonical/.agents/soc-copilot/skills/translation-expertise/japanese.md +0 -515
- package/socc-canonical/.agents/soc-copilot/skills/translation-expertise/tools-resources.md +0 -527
- package/socc-canonical/.agents/soc-copilot/skills/translation-expertise/translation-challenges.md +0 -603
- package/socc-canonical/.agents/soc-copilot/skills/web-search/SKILL.md +0 -322
- package/socc-canonical/.agents/soc-copilot/skills.md +0 -21
- package/socc-canonical/.agents/workflows/SOP.md +0 -137
- package/socc-canonical/README.md +0 -10
- /package/{.claude → .socc}/agents/socc.md +0 -0
- /package/{.claude → .socc}/references/evidence-rules.md +0 -0
- /package/{.claude → .socc}/references/intelligence-source-registry.md +0 -0
- /package/{.claude → .socc}/references/ioc-extraction.md +0 -0
- /package/{.claude → .socc}/references/knowledge-ingestion-policy.md +0 -0
- /package/{.claude → .socc}/references/mitre-guidance.md +0 -0
- /package/{.claude → .socc}/references/output-contract.md +0 -0
- /package/{.claude → .socc}/references/security-json-patterns.md +0 -0
- /package/{.claude → .socc}/references/telemetry-investigation-patterns.md +0 -0
- /package/{.claude → .socc}/rules/socc-business-rules.md +0 -0
- /package/{.claude → .socc}/skills/code-review-excellence/SKILL.md +0 -0
- /package/{.claude → .socc}/skills/cybersecurity-analyst/QUICK_REFERENCE.md +0 -0
- /package/{.claude → .socc}/skills/cybersecurity-analyst/README.md +0 -0
- /package/{.claude → .socc}/skills/cybersecurity-analyst/SKILL.md +0 -0
- /package/{.claude → .socc}/skills/cybersecurity-analyst/tests/quiz.md +0 -0
- /package/{.claude → .socc}/skills/data-visualization/SKILL.md +0 -0
- /package/{.claude → .socc}/skills/deep-research/SKILL.md +0 -0
- /package/{.claude → .socc}/skills/excel-analysis/SKILL.md +0 -0
- /package/{.claude → .socc}/skills/find-skills/SKILL.md +0 -0
- /package/{.claude → .socc}/skills/humanizer/README.md +0 -0
- /package/{.claude → .socc}/skills/humanizer/SKILL.md +0 -0
- /package/{.claude → .socc}/skills/malware-behavior/SKILL.md +0 -0
- /package/{.claude → .socc}/skills/mitre/SKILL.md +0 -0
- /package/{.claude → .socc}/skills/observability-logs-search/SKILL.md +0 -0
- /package/{.claude → .socc}/skills/observability-logs-search/references/log-search-reference.md +0 -0
- /package/{.claude → .socc}/skills/payload-triage/SKILL.md +0 -0
- /package/{.claude → .socc}/skills/phishing-analysis/SKILL.md +0 -0
- /package/{.claude → .socc}/skills/prd/SKILL.md +0 -0
- /package/{.claude → .socc}/skills/remembering-conversations/MCP-TOOLS.md +0 -0
- /package/{.claude → .socc}/skills/remembering-conversations/SKILL.md +0 -0
- /package/{.claude → .socc}/skills/sequential-thinking/README.md +0 -0
- /package/{.claude → .socc}/skills/sequential-thinking/SKILL.md +0 -0
- /package/{.claude → .socc}/skills/sequential-thinking/references/advanced.md +0 -0
- /package/{.claude → .socc}/skills/sequential-thinking/references/examples.md +0 -0
- /package/{.claude → .socc}/skills/soc-generalist/SKILL.md +0 -0
- /package/{.claude → .socc}/skills/suspicious-url/SKILL.md +0 -0
- /package/{.claude → .socc}/skills/systematic-debugging/CREATION-LOG.md +0 -0
- /package/{.claude → .socc}/skills/systematic-debugging/SKILL.md +0 -0
- /package/{.claude → .socc}/skills/systematic-debugging/condition-based-waiting-example.ts +0 -0
- /package/{.claude → .socc}/skills/systematic-debugging/condition-based-waiting.md +0 -0
- /package/{.claude → .socc}/skills/systematic-debugging/defense-in-depth.md +0 -0
- /package/{.claude → .socc}/skills/systematic-debugging/find-polluter.sh +0 -0
- /package/{.claude → .socc}/skills/systematic-debugging/root-cause-tracing.md +0 -0
- /package/{.claude → .socc}/skills/systematic-debugging/test-academic.md +0 -0
- /package/{.claude → .socc}/skills/systematic-debugging/test-pressure-1.md +0 -0
- /package/{.claude → .socc}/skills/systematic-debugging/test-pressure-2.md +0 -0
- /package/{.claude → .socc}/skills/systematic-debugging/test-pressure-3.md +0 -0
- /package/{.claude → .socc}/skills/translation-expertise/SKILL.md +0 -0
- /package/{.claude → .socc}/skills/translation-expertise/chinese-traditional.md +0 -0
- /package/{.claude → .socc}/skills/translation-expertise/english.md +0 -0
- /package/{.claude → .socc}/skills/translation-expertise/japanese.md +0 -0
- /package/{.claude → .socc}/skills/translation-expertise/tools-resources.md +0 -0
- /package/{.claude → .socc}/skills/translation-expertise/translation-challenges.md +0 -0
- /package/{.claude → .socc}/skills/web-search/SKILL.md +0 -0
package/socc-canonical/.agents/soc-copilot/skills/sequential-thinking/references/examples.md
DELETED
|
@@ -1,274 +0,0 @@
|
|
|
1
|
-
# Sequential Thinking Examples
|
|
2
|
-
|
|
3
|
-
## Example 1: Database Performance Problem
|
|
4
|
-
|
|
5
|
-
**Context**: API endpoints timing out, need to diagnose and fix.
|
|
6
|
-
|
|
7
|
-
```typescript
|
|
8
|
-
// Thought 1
|
|
9
|
-
{
|
|
10
|
-
thought: "API timeout reports indicate database bottleneck. Need to profile queries first.",
|
|
11
|
-
thoughtNumber: 1,
|
|
12
|
-
totalThoughts: 6,
|
|
13
|
-
nextThoughtNeeded: true
|
|
14
|
-
}
|
|
15
|
-
|
|
16
|
-
// Thought 2
|
|
17
|
-
{
|
|
18
|
-
thought: "Query logs show user profile endpoint makes 50+ queries per request. Classic N+1 pattern.",
|
|
19
|
-
thoughtNumber: 2,
|
|
20
|
-
totalThoughts: 6,
|
|
21
|
-
nextThoughtNeeded: true
|
|
22
|
-
}
|
|
23
|
-
|
|
24
|
-
// Thought 3
|
|
25
|
-
{
|
|
26
|
-
thought: "Need to implement eager loading for relationships. Checking ORM documentation for optimal approach.",
|
|
27
|
-
thoughtNumber: 3,
|
|
28
|
-
totalThoughts: 7, // Adjusted scope
|
|
29
|
-
nextThoughtNeeded: true
|
|
30
|
-
}
|
|
31
|
-
|
|
32
|
-
// Thought 4
|
|
33
|
-
{
|
|
34
|
-
thought: "ORM supports `include` for eager loading. Will need to modify 3 endpoints: /profile, /dashboard, /settings.",
|
|
35
|
-
thoughtNumber: 4,
|
|
36
|
-
totalThoughts: 7,
|
|
37
|
-
nextThoughtNeeded: true
|
|
38
|
-
}
|
|
39
|
-
|
|
40
|
-
// Thought 5
|
|
41
|
-
{
|
|
42
|
-
thought: "Implementation complete. Testing shows queries reduced from 52 to 4 per request. Response time: 2.1s → 180ms.",
|
|
43
|
-
thoughtNumber: 5,
|
|
44
|
-
totalThoughts: 6, // Fewer steps than expected
|
|
45
|
-
nextThoughtNeeded: true
|
|
46
|
-
}
|
|
47
|
-
|
|
48
|
-
// Thought 6
|
|
49
|
-
{
|
|
50
|
-
thought: "Success. Solution: eager loading eliminated N+1 queries. Next: add query monitoring to catch similar issues early.",
|
|
51
|
-
thoughtNumber: 6,
|
|
52
|
-
totalThoughts: 6,
|
|
53
|
-
nextThoughtNeeded: false // Done
|
|
54
|
-
}
|
|
55
|
-
```
|
|
56
|
-
|
|
57
|
-
## Example 2: Architecture Decision with Branching
|
|
58
|
-
|
|
59
|
-
**Context**: Choosing between microservices and monolith for new project.
|
|
60
|
-
|
|
61
|
-
```typescript
|
|
62
|
-
// Thought 1
|
|
63
|
-
{
|
|
64
|
-
thought: "Need to decide architecture. Key factors: team size (5 devs), timeline (3 months), expected scale (10k users initially).",
|
|
65
|
-
thoughtNumber: 1,
|
|
66
|
-
totalThoughts: 8,
|
|
67
|
-
nextThoughtNeeded: true
|
|
68
|
-
}
|
|
69
|
-
|
|
70
|
-
// Thought 2
|
|
71
|
-
{
|
|
72
|
-
thought: "Two viable approaches: monolith for simplicity or microservices for scalability. Need to evaluate both.",
|
|
73
|
-
thoughtNumber: 2,
|
|
74
|
-
totalThoughts: 10,
|
|
75
|
-
nextThoughtNeeded: true
|
|
76
|
-
}
|
|
77
|
-
|
|
78
|
-
// Branch A: Monolith approach
|
|
79
|
-
{
|
|
80
|
-
thought: "Monolith pros: faster development, simpler deployment, easier debugging. Cons: potential future refactor cost.",
|
|
81
|
-
thoughtNumber: 3,
|
|
82
|
-
totalThoughts: 6,
|
|
83
|
-
branchFromThought: 2,
|
|
84
|
-
branchId: "monolith",
|
|
85
|
-
nextThoughtNeeded: true
|
|
86
|
-
}
|
|
87
|
-
|
|
88
|
-
{
|
|
89
|
-
thought: "For 10k users, single server handles load easily. Deployment: single container, straightforward CI/CD.",
|
|
90
|
-
thoughtNumber: 4,
|
|
91
|
-
totalThoughts: 6,
|
|
92
|
-
branchId: "monolith",
|
|
93
|
-
nextThoughtNeeded: true
|
|
94
|
-
}
|
|
95
|
-
|
|
96
|
-
{
|
|
97
|
-
thought: "Dev velocity high—team can ship in 3 months. Future scaling: can extract services later if needed.",
|
|
98
|
-
thoughtNumber: 5,
|
|
99
|
-
totalThoughts: 6,
|
|
100
|
-
branchId: "monolith",
|
|
101
|
-
nextThoughtNeeded: true
|
|
102
|
-
}
|
|
103
|
-
|
|
104
|
-
// Branch B: Microservices approach
|
|
105
|
-
{
|
|
106
|
-
thought: "Microservices pros: independent scaling, service isolation. Cons: complexity overhead, distributed systems challenges.",
|
|
107
|
-
thoughtNumber: 3,
|
|
108
|
-
totalThoughts: 7,
|
|
109
|
-
branchFromThought: 2,
|
|
110
|
-
branchId: "microservices",
|
|
111
|
-
nextThoughtNeeded: true
|
|
112
|
-
}
|
|
113
|
-
|
|
114
|
-
{
|
|
115
|
-
thought: "For 5-person team: significant overhead in service coordination, API contracts, infrastructure management.",
|
|
116
|
-
thoughtNumber: 4,
|
|
117
|
-
totalThoughts: 7,
|
|
118
|
-
branchId: "microservices",
|
|
119
|
-
nextThoughtNeeded: true
|
|
120
|
-
}
|
|
121
|
-
|
|
122
|
-
{
|
|
123
|
-
thought: "Timeline risk: 3 months insufficient for robust microservices implementation. Need distributed tracing, service mesh, etc.",
|
|
124
|
-
thoughtNumber: 5,
|
|
125
|
-
totalThoughts: 7,
|
|
126
|
-
branchId: "microservices",
|
|
127
|
-
nextThoughtNeeded: true
|
|
128
|
-
}
|
|
129
|
-
|
|
130
|
-
// Convergence
|
|
131
|
-
{
|
|
132
|
-
thought: "Comparing branches: monolith clearly better fit. Small team, tight timeline, modest initial scale. Microservices overhead unjustified.",
|
|
133
|
-
thoughtNumber: 6,
|
|
134
|
-
totalThoughts: 7,
|
|
135
|
-
nextThoughtNeeded: true
|
|
136
|
-
}
|
|
137
|
-
|
|
138
|
-
{
|
|
139
|
-
thought: "Decision: monolith with modular design. Extract services later if specific components need independent scaling.",
|
|
140
|
-
thoughtNumber: 7,
|
|
141
|
-
totalThoughts: 7,
|
|
142
|
-
nextThoughtNeeded: false
|
|
143
|
-
}
|
|
144
|
-
```
|
|
145
|
-
|
|
146
|
-
## Example 3: Debugging with Revision
|
|
147
|
-
|
|
148
|
-
**Context**: Feature works in dev, fails in production.
|
|
149
|
-
|
|
150
|
-
```typescript
|
|
151
|
-
// Thought 1
|
|
152
|
-
{
|
|
153
|
-
thought: "Payment processing works locally but fails in prod. Checking error logs.",
|
|
154
|
-
thoughtNumber: 1,
|
|
155
|
-
totalThoughts: 5,
|
|
156
|
-
nextThoughtNeeded: true
|
|
157
|
-
}
|
|
158
|
-
|
|
159
|
-
// Thought 2
|
|
160
|
-
{
|
|
161
|
-
thought: "Logs show 'Connection refused' to payment API. Likely firewall or network config issue.",
|
|
162
|
-
thoughtNumber: 2,
|
|
163
|
-
totalThoughts: 5,
|
|
164
|
-
nextThoughtNeeded: true
|
|
165
|
-
}
|
|
166
|
-
|
|
167
|
-
// Thought 3
|
|
168
|
-
{
|
|
169
|
-
thought: "Checked firewall rules—payment API port (443) is open. Must be something else.",
|
|
170
|
-
thoughtNumber: 3,
|
|
171
|
-
totalThoughts: 6,
|
|
172
|
-
nextThoughtNeeded: true
|
|
173
|
-
}
|
|
174
|
-
|
|
175
|
-
// Thought 4 - Revision
|
|
176
|
-
{
|
|
177
|
-
thought: "Wait—reviewing logs more carefully. Error message includes 'certificate verify failed'. Not firewall, it's SSL/TLS issue.",
|
|
178
|
-
thoughtNumber: 4,
|
|
179
|
-
totalThoughts: 6,
|
|
180
|
-
isRevision: true,
|
|
181
|
-
revisesThought: 2,
|
|
182
|
-
nextThoughtNeeded: true
|
|
183
|
-
}
|
|
184
|
-
|
|
185
|
-
// Thought 5
|
|
186
|
-
{
|
|
187
|
-
thought: "Prod environment missing intermediate CA certificates. Dev works because it uses self-signed cert with verification disabled.",
|
|
188
|
-
thoughtNumber: 5,
|
|
189
|
-
totalThoughts: 6,
|
|
190
|
-
nextThoughtNeeded: true
|
|
191
|
-
}
|
|
192
|
-
|
|
193
|
-
// Thought 6
|
|
194
|
-
{
|
|
195
|
-
thought: "Installed CA bundle on prod server. Payment processing now works. Root cause: incomplete SSL cert chain.",
|
|
196
|
-
thoughtNumber: 6,
|
|
197
|
-
totalThoughts: 6,
|
|
198
|
-
nextThoughtNeeded: false
|
|
199
|
-
}
|
|
200
|
-
```
|
|
201
|
-
|
|
202
|
-
## Example 4: Complex Feature Planning
|
|
203
|
-
|
|
204
|
-
**Context**: Building real-time collaborative editing feature.
|
|
205
|
-
|
|
206
|
-
```typescript
|
|
207
|
-
// Thought 1
|
|
208
|
-
{
|
|
209
|
-
thought: "Real-time collab editing requires: WebSocket connections, operational transformation or CRDT, conflict resolution, presence tracking.",
|
|
210
|
-
thoughtNumber: 1,
|
|
211
|
-
totalThoughts: 12,
|
|
212
|
-
nextThoughtNeeded: true
|
|
213
|
-
}
|
|
214
|
-
|
|
215
|
-
// Thought 2
|
|
216
|
-
{
|
|
217
|
-
thought: "Core decision: OT vs CRDT. OT requires central server for transform logic, CRDT enables P2P. For our use case, CRDT better.",
|
|
218
|
-
thoughtNumber: 2,
|
|
219
|
-
totalThoughts: 12,
|
|
220
|
-
nextThoughtNeeded: true
|
|
221
|
-
}
|
|
222
|
-
|
|
223
|
-
// Thought 3
|
|
224
|
-
{
|
|
225
|
-
thought: "Research CRDT libraries: Yjs (popular, mature), Automerge (good TypeScript support). Yjs has better performance benchmarks.",
|
|
226
|
-
thoughtNumber: 3,
|
|
227
|
-
totalThoughts: 14, // Scope expanding
|
|
228
|
-
nextThoughtNeeded: true
|
|
229
|
-
}
|
|
230
|
-
|
|
231
|
-
// Thought 4
|
|
232
|
-
{
|
|
233
|
-
thought: "Architecture: Yjs + WebSocket provider + persistence layer. Client-side: Yjs doc syncs via WebSocket. Server: broadcast updates + store snapshots.",
|
|
234
|
-
thoughtNumber: 4,
|
|
235
|
-
totalThoughts: 14,
|
|
236
|
-
nextThoughtNeeded: true
|
|
237
|
-
}
|
|
238
|
-
|
|
239
|
-
// Thought 5
|
|
240
|
-
{
|
|
241
|
-
thought: "Implementation phases: (1) Basic sync, (2) Presence/cursors, (3) Persistence, (4) Conflict UI. Estimate 4 weeks total.",
|
|
242
|
-
thoughtNumber: 5,
|
|
243
|
-
totalThoughts: 14,
|
|
244
|
-
nextThoughtNeeded: true
|
|
245
|
-
}
|
|
246
|
-
|
|
247
|
-
// ... continues through implementation details
|
|
248
|
-
|
|
249
|
-
// Final thought
|
|
250
|
-
{
|
|
251
|
-
thought: "Plan complete. MVP: Yjs + WebSocket + Redis persistence. 4-week timeline. Main risk: scaling WebSocket connections—mitigate with load balancer sticky sessions.",
|
|
252
|
-
thoughtNumber: 14,
|
|
253
|
-
totalThoughts: 14,
|
|
254
|
-
nextThoughtNeeded: false
|
|
255
|
-
}
|
|
256
|
-
```
|
|
257
|
-
|
|
258
|
-
## Usage Patterns Summary
|
|
259
|
-
|
|
260
|
-
| Scenario | Pattern | Key Features |
|
|
261
|
-
|----------|---------|--------------|
|
|
262
|
-
| Linear problem-solving | Sequential thoughts | Steady progress, scope adjustment |
|
|
263
|
-
| Exploring alternatives | Branching | Multiple paths from decision point |
|
|
264
|
-
| Correcting mistakes | Revision | Reference earlier thought, update conclusion |
|
|
265
|
-
| Complex analysis | Mixed | Combine all features as needed |
|
|
266
|
-
|
|
267
|
-
## Tips for Effective Use
|
|
268
|
-
|
|
269
|
-
1. **Start broad, narrow down**: Early thoughts explore problem space, later thoughts dive into specifics
|
|
270
|
-
2. **Show your work**: Document reasoning process, not just conclusions
|
|
271
|
-
3. **Revise when wrong**: Don't continue down incorrect path—backtrack and correct
|
|
272
|
-
4. **Branch at crossroads**: When facing clear alternatives, explore each systematically
|
|
273
|
-
5. **Adjust dynamically**: Change `totalThoughts` as understanding evolves
|
|
274
|
-
6. **End decisively**: Final thought should summarize conclusion and next actions
|
|
@@ -1,53 +0,0 @@
|
|
|
1
|
-
---
|
|
2
|
-
name: soc-generalist
|
|
3
|
-
description: |
|
|
4
|
-
Playbook geral para conversa operacional de SOC em linguagem natural.
|
|
5
|
-
Use quando o analista fizer perguntas abertas sobre CVEs, hashes, IOCs, TTPs,
|
|
6
|
-
comportamento suspeito, hipóteses, hunting, priorização, correlação ou dúvidas
|
|
7
|
-
técnicas que não sejam claramente só phishing, URL, malware comportamental ou
|
|
8
|
-
payload/log para triagem estruturada.
|
|
9
|
-
---
|
|
10
|
-
|
|
11
|
-
# SOC Generalist
|
|
12
|
-
|
|
13
|
-
Assistente conversacional para o dia a dia do SOC.
|
|
14
|
-
|
|
15
|
-
## Quando usar
|
|
16
|
-
|
|
17
|
-
- perguntas abertas em linguagem natural
|
|
18
|
-
- dúvidas sobre CVE, hash, IOC, domínio, IP, TTP, ATT&CK, detecção ou hunting
|
|
19
|
-
- pedidos de interpretação de comportamento suspeito
|
|
20
|
-
- perguntas sobre como investigar, validar, priorizar ou explicar um caso
|
|
21
|
-
- comparações, hipóteses e raciocínio técnico sem payload estruturado claro
|
|
22
|
-
|
|
23
|
-
## Objetivo
|
|
24
|
-
|
|
25
|
-
- ajudar o analista a pensar melhor e mais rápido
|
|
26
|
-
- responder de forma consultiva, não binária por padrão
|
|
27
|
-
- adaptar profundidade ao pedido real do analista
|
|
28
|
-
- diferenciar fato conhecido, hipótese e recomendação prática
|
|
29
|
-
|
|
30
|
-
## Estilo de resposta
|
|
31
|
-
|
|
32
|
-
- responda em PT-BR
|
|
33
|
-
- aceite perguntas curtas, ambíguas ou exploratórias
|
|
34
|
-
- quando a entrada for insuficiente, peça contexto de forma operacional, sem travar a conversa
|
|
35
|
-
- se o analista pedir explicação, priorize clareza
|
|
36
|
-
- se o analista pedir triagem, priorize evidências, risco e próximos passos
|
|
37
|
-
- não force verdict fechado quando a pergunta for exploratória
|
|
38
|
-
|
|
39
|
-
## Estrutura recomendada
|
|
40
|
-
|
|
41
|
-
Quando fizer sentido, organize a resposta em:
|
|
42
|
-
|
|
43
|
-
1. leitura inicial
|
|
44
|
-
2. o que isso pode significar
|
|
45
|
-
3. o que validar a seguir
|
|
46
|
-
4. impacto ou prioridade
|
|
47
|
-
|
|
48
|
-
## Guardrails
|
|
49
|
-
|
|
50
|
-
- não invente reputação, exploração ativa, CVE associada ou família de malware sem evidência
|
|
51
|
-
- não transforme toda pergunta em classificação binária
|
|
52
|
-
- quando houver incerteza, explicite limitações e caminhos de validação
|
|
53
|
-
- se o usuário colar um payload/log claro, aceite que outro playbook pode ser mais adequado
|
|
@@ -1,51 +0,0 @@
|
|
|
1
|
-
---
|
|
2
|
-
name: suspicious-url
|
|
3
|
-
description: |
|
|
4
|
-
Specialized SOC Copilot skill for analyzing suspicious URLs, domains, redirect patterns, typo-squatting,
|
|
5
|
-
and web-delivered indicators.
|
|
6
|
-
Use when the primary artifact is a URL, domain, or web destination.
|
|
7
|
-
---
|
|
8
|
-
|
|
9
|
-
# Suspicious URL
|
|
10
|
-
|
|
11
|
-
Focused workflow for web indicators and suspicious destinations.
|
|
12
|
-
|
|
13
|
-
## When to Use
|
|
14
|
-
|
|
15
|
-
- primary artifact is a URL, domain, or redirect chain
|
|
16
|
-
- user asks whether a link is suspicious
|
|
17
|
-
- the input contains obvious web navigation or destination details
|
|
18
|
-
|
|
19
|
-
## Workflow
|
|
20
|
-
|
|
21
|
-
### 1. Parse the web artifact
|
|
22
|
-
|
|
23
|
-
- extract scheme, domain, subdomain, path, parameters, and visible redirect clues
|
|
24
|
-
- note encoding, shortening, impersonation, or typo-squatting patterns
|
|
25
|
-
|
|
26
|
-
### 2. Evaluate risk indicators
|
|
27
|
-
|
|
28
|
-
- identify suspicious hosting, deceptive pathing, brand impersonation, and unusual parameter usage
|
|
29
|
-
- separate structural risk from reputation-based claims
|
|
30
|
-
|
|
31
|
-
### 3. Determine verdict carefully
|
|
32
|
-
|
|
33
|
-
Read [`../../references/evidence-rules.md`](../../references/evidence-rules.md).
|
|
34
|
-
|
|
35
|
-
- determine whether the URL is suspicious, malicious, benign, or inconclusive
|
|
36
|
-
- explain what part of the URL or context supports that conclusion
|
|
37
|
-
|
|
38
|
-
### 4. Recommend safe validation
|
|
39
|
-
|
|
40
|
-
- suggest sandboxing, proxy validation, DNS checks, or user notification where appropriate
|
|
41
|
-
- avoid encouraging unsafe live-click validation
|
|
42
|
-
|
|
43
|
-
## Output Contract
|
|
44
|
-
|
|
45
|
-
Read [`../../references/output-contract.md`](../../references/output-contract.md).
|
|
46
|
-
|
|
47
|
-
## Guardrails
|
|
48
|
-
|
|
49
|
-
- Do not claim malicious reputation without an actual lookup.
|
|
50
|
-
- Make conditional statements explicit when the conclusion depends on missing context.
|
|
51
|
-
- Keep the advice safe for analysts and end users.
|
|
@@ -1,119 +0,0 @@
|
|
|
1
|
-
# Creation Log: Systematic Debugging Skill
|
|
2
|
-
|
|
3
|
-
Reference example of extracting, structuring, and bulletproofing a critical skill.
|
|
4
|
-
|
|
5
|
-
## Source Material
|
|
6
|
-
|
|
7
|
-
Extracted debugging framework from `/Users/jesse/.claude/CLAUDE.md`:
|
|
8
|
-
- 4-phase systematic process (Investigation → Pattern Analysis → Hypothesis → Implementation)
|
|
9
|
-
- Core mandate: ALWAYS find root cause, NEVER fix symptoms
|
|
10
|
-
- Rules designed to resist time pressure and rationalization
|
|
11
|
-
|
|
12
|
-
## Extraction Decisions
|
|
13
|
-
|
|
14
|
-
**What to include:**
|
|
15
|
-
- Complete 4-phase framework with all rules
|
|
16
|
-
- Anti-shortcuts ("NEVER fix symptom", "STOP and re-analyze")
|
|
17
|
-
- Pressure-resistant language ("even if faster", "even if I seem in a hurry")
|
|
18
|
-
- Concrete steps for each phase
|
|
19
|
-
|
|
20
|
-
**What to leave out:**
|
|
21
|
-
- Project-specific context
|
|
22
|
-
- Repetitive variations of same rule
|
|
23
|
-
- Narrative explanations (condensed to principles)
|
|
24
|
-
|
|
25
|
-
## Structure Following skill-creation/SKILL.md
|
|
26
|
-
|
|
27
|
-
1. **Rich when_to_use** - Included symptoms and anti-patterns
|
|
28
|
-
2. **Type: technique** - Concrete process with steps
|
|
29
|
-
3. **Keywords** - "root cause", "symptom", "workaround", "debugging", "investigation"
|
|
30
|
-
4. **Flowchart** - Decision point for "fix failed" → re-analyze vs add more fixes
|
|
31
|
-
5. **Phase-by-phase breakdown** - Scannable checklist format
|
|
32
|
-
6. **Anti-patterns section** - What NOT to do (critical for this skill)
|
|
33
|
-
|
|
34
|
-
## Bulletproofing Elements
|
|
35
|
-
|
|
36
|
-
Framework designed to resist rationalization under pressure:
|
|
37
|
-
|
|
38
|
-
### Language Choices
|
|
39
|
-
- "ALWAYS" / "NEVER" (not "should" / "try to")
|
|
40
|
-
- "even if faster" / "even if I seem in a hurry"
|
|
41
|
-
- "STOP and re-analyze" (explicit pause)
|
|
42
|
-
- "Don't skip past" (catches the actual behavior)
|
|
43
|
-
|
|
44
|
-
### Structural Defenses
|
|
45
|
-
- **Phase 1 required** - Can't skip to implementation
|
|
46
|
-
- **Single hypothesis rule** - Forces thinking, prevents shotgun fixes
|
|
47
|
-
- **Explicit failure mode** - "IF your first fix doesn't work" with mandatory action
|
|
48
|
-
- **Anti-patterns section** - Shows exactly what shortcuts look like
|
|
49
|
-
|
|
50
|
-
### Redundancy
|
|
51
|
-
- Root cause mandate in overview + when_to_use + Phase 1 + implementation rules
|
|
52
|
-
- "NEVER fix symptom" appears 4 times in different contexts
|
|
53
|
-
- Each phase has explicit "don't skip" guidance
|
|
54
|
-
|
|
55
|
-
## Testing Approach
|
|
56
|
-
|
|
57
|
-
Created 4 validation tests following skills/meta/testing-skills-with-subagents:
|
|
58
|
-
|
|
59
|
-
### Test 1: Academic Context (No Pressure)
|
|
60
|
-
- Simple bug, no time pressure
|
|
61
|
-
- **Result:** Perfect compliance, complete investigation
|
|
62
|
-
|
|
63
|
-
### Test 2: Time Pressure + Obvious Quick Fix
|
|
64
|
-
- User "in a hurry", symptom fix looks easy
|
|
65
|
-
- **Result:** Resisted shortcut, followed full process, found real root cause
|
|
66
|
-
|
|
67
|
-
### Test 3: Complex System + Uncertainty
|
|
68
|
-
- Multi-layer failure, unclear if can find root cause
|
|
69
|
-
- **Result:** Systematic investigation, traced through all layers, found source
|
|
70
|
-
|
|
71
|
-
### Test 4: Failed First Fix
|
|
72
|
-
- Hypothesis doesn't work, temptation to add more fixes
|
|
73
|
-
- **Result:** Stopped, re-analyzed, formed new hypothesis (no shotgun)
|
|
74
|
-
|
|
75
|
-
**All tests passed.** No rationalizations found.
|
|
76
|
-
|
|
77
|
-
## Iterations
|
|
78
|
-
|
|
79
|
-
### Initial Version
|
|
80
|
-
- Complete 4-phase framework
|
|
81
|
-
- Anti-patterns section
|
|
82
|
-
- Flowchart for "fix failed" decision
|
|
83
|
-
|
|
84
|
-
### Enhancement 1: TDD Reference
|
|
85
|
-
- Added link to skills/testing/test-driven-development
|
|
86
|
-
- Note explaining TDD's "simplest code" ≠ debugging's "root cause"
|
|
87
|
-
- Prevents confusion between methodologies
|
|
88
|
-
|
|
89
|
-
## Final Outcome
|
|
90
|
-
|
|
91
|
-
Bulletproof skill that:
|
|
92
|
-
- ✅ Clearly mandates root cause investigation
|
|
93
|
-
- ✅ Resists time pressure rationalization
|
|
94
|
-
- ✅ Provides concrete steps for each phase
|
|
95
|
-
- ✅ Shows anti-patterns explicitly
|
|
96
|
-
- ✅ Tested under multiple pressure scenarios
|
|
97
|
-
- ✅ Clarifies relationship to TDD
|
|
98
|
-
- ✅ Ready for use
|
|
99
|
-
|
|
100
|
-
## Key Insight
|
|
101
|
-
|
|
102
|
-
**Most important bulletproofing:** Anti-patterns section showing exact shortcuts that feel justified in the moment. When Claude thinks "I'll just add this one quick fix", seeing that exact pattern listed as wrong creates cognitive friction.
|
|
103
|
-
|
|
104
|
-
## Usage Example
|
|
105
|
-
|
|
106
|
-
When encountering a bug:
|
|
107
|
-
1. Load skill: skills/debugging/systematic-debugging
|
|
108
|
-
2. Read overview (10 sec) - reminded of mandate
|
|
109
|
-
3. Follow Phase 1 checklist - forced investigation
|
|
110
|
-
4. If tempted to skip - see anti-pattern, stop
|
|
111
|
-
5. Complete all phases - root cause found
|
|
112
|
-
|
|
113
|
-
**Time investment:** 5-10 minutes
|
|
114
|
-
**Time saved:** Hours of symptom-whack-a-mole
|
|
115
|
-
|
|
116
|
-
---
|
|
117
|
-
|
|
118
|
-
*Created: 2025-10-03*
|
|
119
|
-
*Purpose: Reference example for skill extraction and bulletproofing*
|