home / skills / neurofoo / agent-skills / redteam

redteam skill

/redteam

npx playbooks add skill neurofoo/agent-skills --skill redteam

Review the files below or copy the command above to add this skill to your agents.

Files (1)
SKILL.md
2.7 KB
---
name: redteam
description: Red team adversarial analysis to find weaknesses, vulnerabilities, and failure modes. Use before launches, for security review, or when a plan feels too perfect.
user-invocable: true
---

# Red Team Analysis

Conduct an adversarial analysis to find weaknesses, vulnerabilities, and failure modes in a plan, system, or strategy.

## Instructions

Think like an attacker. Your job is to break this, find the gaps, and expose what could go wrong. Be thorough and creative in your attacks.

### Output Format

**Target**: [What we're attacking]
**Objective**: [What would "breaking it" look like?]

---

## Target Understanding

**Summary of the Plan/System**
[Brief description of what we're analyzing]

**Key Assumptions**
- [Assumption 1]
- [Assumption 2]

---

## Attack Surface Analysis

**Entry Points / Vulnerabilities**
| Vector | Description | Severity |
|--------|-------------|----------|
| [attack vector] | [how it could be exploited] | Critical/High/Med/Low |

---

## Failure Mode Analysis

### Technical/Operational Failures
| Failure Mode | Trigger | Impact |
|--------------|---------|--------|
| [what could fail] | [what causes it] | [effect] |

### Human Failures
| Failure Mode | Trigger | Impact |
|--------------|---------|--------|
| [human error] | [situation] | [consequence] |

---

## Adversary Scenarios

**If I wanted this to fail, I would...**

### Scenario 1: [Attack Name]
- **Attack method**: [how they'd do it]
- **Likelihood of success**: [High/Med/Low]
- **Impact if successful**: [consequences]

### Scenario 2: [Attack Name]
- **Attack method**: [how]
- **Likelihood of success**: [High/Med/Low]
- **Impact if successful**: [consequences]

---

## Assumption Attacks

| Assumption | Attack | What If Wrong? |
|------------|--------|----------------|
| [assumption] | [challenge to it] | [consequences] |

---

## Blind Spot Analysis

**What are we not seeing?**
- [Blind spot 1]
- [Blind spot 2]

**What are we too optimistic about?**
- [Over-optimism 1]

---

## Red Team Findings

### Critical Vulnerabilities (Must Address)
| Vulnerability | Risk | Mitigation |
|---------------|------|-----------|
| [vulnerability] | [risk level] | [how to fix] |

### High-Priority Concerns
| Concern | Recommendation |
|---------|----------------|
| [concern] | [recommendation] |

---

## Hardening Recommendations

**Immediate actions**:
1. [Action 1]
2. [Action 2]

**Ongoing monitoring**:
1. [What to watch]

---

**Bottom Line**
> [Is this plan/system ready? What must change?]

## Guidelines

- Be adversarial, not just critical
- Think creatively—real attackers don't follow rules
- Look for cascading failures
- The goal is to make it stronger, not just find flaws

$ARGUMENTS