home / skills / neurofoo / agent-skills / redteam
npx playbooks add skill neurofoo/agent-skills --skill redteamReview the files below or copy the command above to add this skill to your agents.
---
name: redteam
description: Red team adversarial analysis to find weaknesses, vulnerabilities, and failure modes. Use before launches, for security review, or when a plan feels too perfect.
user-invocable: true
---
# Red Team Analysis
Conduct an adversarial analysis to find weaknesses, vulnerabilities, and failure modes in a plan, system, or strategy.
## Instructions
Think like an attacker. Your job is to break this, find the gaps, and expose what could go wrong. Be thorough and creative in your attacks.
### Output Format
**Target**: [What we're attacking]
**Objective**: [What would "breaking it" look like?]
---
## Target Understanding
**Summary of the Plan/System**
[Brief description of what we're analyzing]
**Key Assumptions**
- [Assumption 1]
- [Assumption 2]
---
## Attack Surface Analysis
**Entry Points / Vulnerabilities**
| Vector | Description | Severity |
|--------|-------------|----------|
| [attack vector] | [how it could be exploited] | Critical/High/Med/Low |
---
## Failure Mode Analysis
### Technical/Operational Failures
| Failure Mode | Trigger | Impact |
|--------------|---------|--------|
| [what could fail] | [what causes it] | [effect] |
### Human Failures
| Failure Mode | Trigger | Impact |
|--------------|---------|--------|
| [human error] | [situation] | [consequence] |
---
## Adversary Scenarios
**If I wanted this to fail, I would...**
### Scenario 1: [Attack Name]
- **Attack method**: [how they'd do it]
- **Likelihood of success**: [High/Med/Low]
- **Impact if successful**: [consequences]
### Scenario 2: [Attack Name]
- **Attack method**: [how]
- **Likelihood of success**: [High/Med/Low]
- **Impact if successful**: [consequences]
---
## Assumption Attacks
| Assumption | Attack | What If Wrong? |
|------------|--------|----------------|
| [assumption] | [challenge to it] | [consequences] |
---
## Blind Spot Analysis
**What are we not seeing?**
- [Blind spot 1]
- [Blind spot 2]
**What are we too optimistic about?**
- [Over-optimism 1]
---
## Red Team Findings
### Critical Vulnerabilities (Must Address)
| Vulnerability | Risk | Mitigation |
|---------------|------|-----------|
| [vulnerability] | [risk level] | [how to fix] |
### High-Priority Concerns
| Concern | Recommendation |
|---------|----------------|
| [concern] | [recommendation] |
---
## Hardening Recommendations
**Immediate actions**:
1. [Action 1]
2. [Action 2]
**Ongoing monitoring**:
1. [What to watch]
---
**Bottom Line**
> [Is this plan/system ready? What must change?]
## Guidelines
- Be adversarial, not just critical
- Think creatively—real attackers don't follow rules
- Look for cascading failures
- The goal is to make it stronger, not just find flaws
$ARGUMENTS