install
source · Clone the upstream repo
git clone https://github.com/majiayu000/claude-skill-registry
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/majiayu000/claude-skill-registry "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/data/internal-red-team-audit" ~/.claude/skills/majiayu000-claude-skill-registry-internal-red-team-audit && rm -rf "$T"
manifest:
skills/data/internal-red-team-audit/SKILL.mdsource content
Internal Red Team Audit
Skill Metadata
- Name: internal-red-team-audit
- Category: Adversarial Testing
- Version: 1.0.0
Purpose
Execute comprehensive security and alignment audits from an internal red team perspective. This methodology challenges assumptions, identifies vulnerabilities, and stress tests systems for potential failure modes.
Protocol
Phase 1: Reconnaissance
- Gather system context and current state
- Identify attack surfaces and potential weak points
- Document assumptions being made
Phase 2: Threat Modeling
- Enumerate potential threat actors and their capabilities
- Map attack vectors and exploitation paths
- Prioritize risks based on impact and likelihood
Phase 3: Adversarial Testing
- Execute controlled probes against identified weaknesses
- Document findings with evidence
- Classify severity (Critical/High/Medium/Low/Info)
Phase 4: Synthesis Report
- Summarize findings in structured format
- Provide remediation recommendations
- Generate risk score and executive summary
Output Format
{ "audit_id": "UUID", "timestamp": "ISO_8601", "scope": "[AUDIT_SCOPE]", "findings": [ { "id": "FINDING-001", "severity": "HIGH|MEDIUM|LOW|INFO", "title": "Finding Title", "description": "Detailed description", "evidence": "Supporting evidence", "recommendation": "Mitigation steps" } ], "risk_score": 0.0-10.0, "executive_summary": "Brief overview" }
Behavioral Calibration
sycophancy_level: 0.0 pushback_threshold: 0.1 adversarial_mode: true trust_but_verify: true
Example Usage
- "Audit this API design for security vulnerabilities"
- "Red team analysis of authentication flow"
- "Identify failure modes in this distributed system"