- Updated domain plugin.json counts (engineering-team: 36, engineering: 36) - Added 6 new skills to mkdocs.yml navigation - Updated engineering-team/CLAUDE.md with security skills section - Generated docs pages for all 6 new skills - Synced Codex + Gemini indexes and symlinks - Ran cross-platform conversion (Cursor, Aider, Windsurf, KiloCode, OpenCode, Augment, Antigravity) https://claude.ai/code/session_01XY4i7SR4BHLWJpdjwGnNLG
This commit is contained in:
@@ -1,7 +1,7 @@
|
||||
{
|
||||
"version": "1.0.0",
|
||||
"name": "gemini-cli-skills",
|
||||
"total_skills": 264,
|
||||
"total_skills": 270,
|
||||
"skills": [
|
||||
{
|
||||
"name": "README",
|
||||
@@ -443,6 +443,11 @@
|
||||
"category": "engineering",
|
||||
"description": "Adversarial code review that breaks the self-review monoculture. Use when you want a genuinely critical review of recent changes, before merging a PR, or when you suspect Claude is being too agreeable about code quality. Forces perspective shifts through hostile reviewer personas that catch blind spots the author's mental model shares with the reviewer."
|
||||
},
|
||||
{
|
||||
"name": "ai-security",
|
||||
"category": "engineering",
|
||||
"description": "Use when assessing AI/ML systems for prompt injection, jailbreak vulnerabilities, model inversion risk, data poisoning exposure, or agent tool abuse. Covers MITRE ATLAS technique mapping, injection signature detection, and adversarial robustness scoring."
|
||||
},
|
||||
{
|
||||
"name": "aws-solution-architect",
|
||||
"category": "engineering",
|
||||
@@ -458,6 +463,11 @@
|
||||
"category": "engineering",
|
||||
"description": ">-"
|
||||
},
|
||||
{
|
||||
"name": "cloud-security",
|
||||
"category": "engineering",
|
||||
"description": "Use when assessing cloud infrastructure for security misconfigurations, IAM privilege escalation paths, S3 public exposure, open security group rules, or IaC security gaps. Covers AWS, Azure, and GCP posture assessment with MITRE ATT&CK mapping."
|
||||
},
|
||||
{
|
||||
"name": "code-reviewer",
|
||||
"category": "engineering",
|
||||
@@ -513,6 +523,11 @@
|
||||
"category": "engineering",
|
||||
"description": "Incident Commander Skill"
|
||||
},
|
||||
{
|
||||
"name": "incident-response",
|
||||
"category": "engineering",
|
||||
"description": "Use when a security incident has been detected or declared and needs classification, triage, escalation path determination, and forensic evidence collection. Covers SEV1-SEV4 classification, false positive filtering, incident taxonomy, and NIST SP 800-61 lifecycle."
|
||||
},
|
||||
{
|
||||
"name": "migrate",
|
||||
"category": "engineering",
|
||||
@@ -533,6 +548,11 @@
|
||||
"category": "engineering",
|
||||
"description": "Graduate a proven pattern from auto-memory (MEMORY.md) to CLAUDE.md or .claude/rules/ for permanent enforcement."
|
||||
},
|
||||
{
|
||||
"name": "red-team",
|
||||
"category": "engineering",
|
||||
"description": "Use when planning or executing authorized red team engagements, attack path analysis, or offensive security simulations. Covers MITRE ATT&CK kill-chain planning, technique scoring, choke point identification, OPSEC risk assessment, and crown jewel targeting."
|
||||
},
|
||||
{
|
||||
"name": "remember",
|
||||
"category": "engineering",
|
||||
@@ -663,6 +683,11 @@
|
||||
"category": "engineering",
|
||||
"description": ">-"
|
||||
},
|
||||
{
|
||||
"name": "threat-detection",
|
||||
"category": "engineering",
|
||||
"description": "Use when hunting for threats in an environment, analyzing IOCs, or detecting behavioral anomalies in telemetry. Covers hypothesis-driven threat hunting, IOC sweep generation, z-score anomaly detection, and MITRE ATT&CK-mapped signal prioritization."
|
||||
},
|
||||
{
|
||||
"name": "agent-designer",
|
||||
"category": "engineering-advanced",
|
||||
@@ -853,6 +878,11 @@
|
||||
"category": "engineering-advanced",
|
||||
"description": "Use when the user asks to set up secret management infrastructure, integrate HashiCorp Vault, configure cloud secret stores (AWS Secrets Manager, Azure Key Vault, GCP Secret Manager), implement secret rotation, or audit secret access patterns."
|
||||
},
|
||||
{
|
||||
"name": "self-eval",
|
||||
"category": "engineering-advanced",
|
||||
"description": "Honestly evaluate AI work quality using a two-axis scoring system. Use after completing a task, code review, or work session to get an unbiased assessment. Detects score inflation, forces devil's advocate reasoning, and persists scores across sessions."
|
||||
},
|
||||
{
|
||||
"name": "setup",
|
||||
"category": "engineering-advanced",
|
||||
@@ -1342,11 +1372,11 @@
|
||||
"description": "Command resources"
|
||||
},
|
||||
"engineering": {
|
||||
"count": 46,
|
||||
"count": 51,
|
||||
"description": "Engineering resources"
|
||||
},
|
||||
"engineering-advanced": {
|
||||
"count": 49,
|
||||
"count": 50,
|
||||
"description": "Engineering-advanced resources"
|
||||
},
|
||||
"finance": {
|
||||
|
||||
1
.gemini/skills/ai-security/SKILL.md
Symbolic link
1
.gemini/skills/ai-security/SKILL.md
Symbolic link
@@ -0,0 +1 @@
|
||||
../../../engineering-team/ai-security/SKILL.md
|
||||
1
.gemini/skills/cloud-security/SKILL.md
Symbolic link
1
.gemini/skills/cloud-security/SKILL.md
Symbolic link
@@ -0,0 +1 @@
|
||||
../../../engineering-team/cloud-security/SKILL.md
|
||||
1
.gemini/skills/incident-response/SKILL.md
Symbolic link
1
.gemini/skills/incident-response/SKILL.md
Symbolic link
@@ -0,0 +1 @@
|
||||
../../../engineering-team/incident-response/SKILL.md
|
||||
1
.gemini/skills/red-team/SKILL.md
Symbolic link
1
.gemini/skills/red-team/SKILL.md
Symbolic link
@@ -0,0 +1 @@
|
||||
../../../engineering-team/red-team/SKILL.md
|
||||
1
.gemini/skills/self-eval/SKILL.md
Symbolic link
1
.gemini/skills/self-eval/SKILL.md
Symbolic link
@@ -0,0 +1 @@
|
||||
../../../engineering/self-eval/SKILL.md
|
||||
1
.gemini/skills/threat-detection/SKILL.md
Symbolic link
1
.gemini/skills/threat-detection/SKILL.md
Symbolic link
@@ -0,0 +1 @@
|
||||
../../../engineering-team/threat-detection/SKILL.md
|
||||
Reference in New Issue
Block a user