agents: add planned AISTALK orchestrator and crew profile

This commit is contained in:
Apple
2026-02-20 10:24:59 -08:00
parent e01ed7be75
commit 195eb9b7ac
34 changed files with 663 additions and 47 deletions

View File

@@ -291,6 +291,154 @@ agents:
accepts_from: [daarwizz]
can_delegate_to: [helion_team]
# ---------------------------------------------------------------------------
# AISTALK - Autonomous Cyber Detective Agency
# ---------------------------------------------------------------------------
- id: aistalk
display_name: AISTALK
class: top_level
visibility: private
scope: global
telegram_mode: "off"
lifecycle_status: planned
public_channels:
telegram: false
canonical_role: "Autonomous Cyber Detective Agency Orchestrator"
mission: |
AISTALK - автономне агентство кібердетективів для розслідувань загроз і
вразливостей у Web2, Web3, AI та quantum-risk сценаріях.
На етапі планування агент працює як внутрішній оркестратор команди
спеціалізованих ролей з асинхронним case lifecycle.
domains:
- cybersecurity
- threat_intelligence
- incident_response
- web3_security
- ai_security
- quantum_risk
- osint
- vulnerability_management
routing:
priority: 84
keywords:
- aistalk
- cyber
- cybersecurity
- кібер
- osint
- incident
- threat
- vulnerability
- redteam
- blueteam
- bughunter
- quantum risk
llm_profile: reasoning
prompt_file: aistalk_prompt.txt
orchestration:
mode: hybrid
crew:
enabled: true
default_profile: default
profile_hints:
default: [osint, threat_hunt, vulns, web3, ai, red-blue]
profiles:
default:
team_name: AISTALK Cyber Detective Unit
parallel_roles: true
max_concurrency: 6
synthesis:
role_context: AISTALK Orchestrator & Analyst
system_prompt_ref: roles/aistalk/orchestrator_synthesis.md
llm_profile: reasoning
team:
- id: tracer
role_context: Tracer (OSINT Collector)
system_prompt_ref: roles/aistalk/tracer.md
llm_profile: science
- id: shadow
role_context: Shadow (Covert Intelligence)
system_prompt_ref: roles/aistalk/shadow.md
llm_profile: reasoning
- id: stealth
role_context: Stealth (Low-Noise Recon)
system_prompt_ref: roles/aistalk/stealth.md
llm_profile: reasoning
- id: graph
role_context: Graph (Entity Relationship Mapper)
system_prompt_ref: roles/aistalk/graph.md
llm_profile: science
- id: risk
role_context: Risk (Scoring and Prioritization)
system_prompt_ref: roles/aistalk/risk.md
llm_profile: reasoning
- id: neuron
role_context: Neuron (Deep Analysis)
system_prompt_ref: roles/aistalk/neuron.md
llm_profile: reasoning
- id: vault
role_context: Vault (Secrets and Confidential Data Guard)
system_prompt_ref: roles/aistalk/vault.md
llm_profile: fast
- id: redteam
role_context: RedTeam (Ethical Attack Simulation)
system_prompt_ref: roles/aistalk/redteam.md
llm_profile: reasoning
- id: bughunter
role_context: BugHunter (Static Security Scan)
system_prompt_ref: roles/aistalk/bughunter.md
llm_profile: science
- id: devteam
role_context: DevTeam (Remediation Designer)
system_prompt_ref: roles/aistalk/devteam.md
llm_profile: reasoning
- id: blueteam
role_context: BlueTeam (Defense Hardening)
system_prompt_ref: roles/aistalk/blueteam.md
llm_profile: reasoning
- id: purpleteam
role_context: PurpleTeam (Attack-Defense Loop)
system_prompt_ref: roles/aistalk/purpleteam.md
llm_profile: community
- id: quantum
role_context: Quantum (Post-Quantum Risk Assessor)
system_prompt_ref: roles/aistalk/quantum.md
llm_profile: science
delegation:
enabled: false
a2a:
enabled: false
allow_top_level_agents: []
max_hops: 2
forbid_self: true
response_contract:
user_visible_speaker: self
crew_roles_user_visible: false
crewai:
enabled: true
orchestrator: true
team:
- role: "Tracer"
skills: [osint, digital_footprint]
- role: "Shadow"
skills: [darkweb_recon, covert_collection]
- role: "Graph"
skills: [entity_resolution, link_analysis]
- role: "Risk"
skills: [cvss, mitre_mapping]
- role: "Analyst"
skills: [synthesis, reporting]
handoff_contract:
accepts_from: [daarwizz, yaromir]
can_delegate_to: [aistalk_team]
# ---------------------------------------------------------------------------
# ALATEYA - Research Lab OS
# ---------------------------------------------------------------------------

View File

@@ -28,6 +28,22 @@
"biominer"
]
},
{
"id": "aistalk",
"display_name": "AISTALK",
"role": "Autonomous Cyber Detective Agency Orchestrator",
"can_orchestrate": true,
"domains": [
"cybersecurity",
"threat_intelligence",
"incident_response",
"web3_security",
"ai_security",
"quantum_risk",
"osint",
"vulnerability_management"
]
},
{
"id": "alateya",
"display_name": "Aletheia",
@@ -159,19 +175,6 @@
"values",
"wellbeing"
]
},
{
"id": "sofiia",
"display_name": "SOFIIA",
"role": "Chief AI Architect & Monitor Orchestrator",
"can_orchestrate": true,
"domains": [
"infrastructure",
"observability",
"runtime_guard",
"incident_response",
"node_orchestration"
]
}
],
"workers": [
@@ -216,6 +219,63 @@
}
]
},
"aistalk": {
"team_name": "AISTALK Cyber Detective Unit",
"members": [
{
"role": "Tracer (OSINT Collector)",
"skills": []
},
{
"role": "Shadow (Covert Intelligence)",
"skills": []
},
{
"role": "Stealth (Low-Noise Recon)",
"skills": []
},
{
"role": "Graph (Entity Relationship Mapper)",
"skills": []
},
{
"role": "Risk (Scoring and Prioritization)",
"skills": []
},
{
"role": "Neuron (Deep Analysis)",
"skills": []
},
{
"role": "Vault (Secrets and Confidential Data Guard)",
"skills": []
},
{
"role": "RedTeam (Ethical Attack Simulation)",
"skills": []
},
{
"role": "BugHunter (Static Security Scan)",
"skills": []
},
{
"role": "DevTeam (Remediation Designer)",
"skills": []
},
{
"role": "BlueTeam (Defense Hardening)",
"skills": []
},
{
"role": "PurpleTeam (Attack-Defense Loop)",
"skills": []
},
{
"role": "Quantum (Post-Quantum Risk Assessor)",
"skills": []
}
]
},
"alateya": {
"team_name": "Aletheia Team",
"members": [
@@ -509,35 +569,6 @@
]
}
]
},
"sofiia": {
"team_name": "SOFIIA Monitor Orchestration Team",
"members": [
{
"role": "Node Monitor Coordinator",
"skills": [
"observability",
"incident_triage",
"runbook_coordination"
]
},
{
"role": "Monitor Handoff Controller",
"skills": [
"multi_node_routing",
"escalation",
"consent_safe_dispatch"
]
},
{
"role": "Infrastructure Synthesizer",
"skills": [
"summary",
"risk_reporting",
"next_steps"
]
}
]
}
}
}
}

View File

@@ -104,6 +104,80 @@ helion:
- legal
- GGU
- BioMiner
aistalk:
profiles:
default:
team_name: AISTALK Cyber Detective Unit
parallel_roles: true
max_concurrency: 6
synthesis:
role_context: AISTALK Orchestrator & Analyst
system_prompt_ref: roles/aistalk/orchestrator_synthesis.md
llm_profile: reasoning
team:
- id: tracer
role_context: Tracer (OSINT Collector)
system_prompt_ref: roles/aistalk/tracer.md
llm_profile: science
- id: shadow
role_context: Shadow (Covert Intelligence)
system_prompt_ref: roles/aistalk/shadow.md
llm_profile: reasoning
- id: stealth
role_context: Stealth (Low-Noise Recon)
system_prompt_ref: roles/aistalk/stealth.md
llm_profile: reasoning
- id: graph
role_context: Graph (Entity Relationship Mapper)
system_prompt_ref: roles/aistalk/graph.md
llm_profile: science
- id: risk
role_context: Risk (Scoring and Prioritization)
system_prompt_ref: roles/aistalk/risk.md
llm_profile: reasoning
- id: neuron
role_context: Neuron (Deep Analysis)
system_prompt_ref: roles/aistalk/neuron.md
llm_profile: reasoning
- id: vault
role_context: Vault (Secrets and Confidential Data Guard)
system_prompt_ref: roles/aistalk/vault.md
llm_profile: fast
- id: redteam
role_context: RedTeam (Ethical Attack Simulation)
system_prompt_ref: roles/aistalk/redteam.md
llm_profile: reasoning
- id: bughunter
role_context: BugHunter (Static Security Scan)
system_prompt_ref: roles/aistalk/bughunter.md
llm_profile: science
- id: devteam
role_context: DevTeam (Remediation Designer)
system_prompt_ref: roles/aistalk/devteam.md
llm_profile: reasoning
- id: blueteam
role_context: BlueTeam (Defense Hardening)
system_prompt_ref: roles/aistalk/blueteam.md
llm_profile: reasoning
- id: purpleteam
role_context: PurpleTeam (Attack-Defense Loop)
system_prompt_ref: roles/aistalk/purpleteam.md
llm_profile: community
- id: quantum
role_context: Quantum (Post-Quantum Risk Assessor)
system_prompt_ref: roles/aistalk/quantum.md
llm_profile: science
delegation:
enabled: false
default_profile: default
profile_hints:
default:
- osint
- threat_hunt
- vulns
- web3
- ai
- red-blue
nutra:
profiles:
default:

View File

@@ -0,0 +1,11 @@
# BlueTeam (Defense Hardening)
Turn findings into defensive controls and monitoring improvements.
Output:
- detection_gaps
- hardening_actions
- monitoring_updates
Boundary:
- defensive analysis only.

View File

@@ -0,0 +1,11 @@
# BugHunter (Static Security Scan)
Detect vulnerabilities and misconfigurations from provided code/configs.
Output:
- vulnerability_list
- severity
- affected_components
Boundary:
- no exploitation execution.

View File

@@ -0,0 +1,11 @@
# DevTeam (Remediation Designer)
Propose secure fixes, patches, and hardening steps.
Output:
- remediation_options
- patch_outline
- rollout_risk_notes
Boundary:
- no direct production deployment.

View File

@@ -0,0 +1,11 @@
# Graph (Entity Relationship Mapper)
Build relationship graph across entities, events, and indicators.
Output:
- key_nodes
- key_paths
- suspicious_clusters
Boundary:
- do not assign final risk priority.

View File

@@ -0,0 +1,11 @@
# Neuron (Deep Analysis)
Perform pattern analysis and infer likely attack hypotheses.
Output:
- anomaly_patterns
- attack_hypotheses
- confidence_and_alternatives
Boundary:
- analyze existing evidence only.

View File

@@ -0,0 +1,11 @@
# AISTALK Orchestrator & Analyst
Role:
- Coordinate subagents and synthesize a single user-facing result.
Rules:
- Do not expose internal role chatter.
- Keep the answer decision-oriented: findings, risk, action.
- If data is insufficient, request only missing critical inputs.
- Respect mode: public vs confidential.
- Do not promise actions the system cannot execute.

View File

@@ -0,0 +1,11 @@
# PurpleTeam (Attack-Defense Loop)
Integrate redteam and blueteam outcomes into one improvement loop.
Output:
- joint_findings
- feedback_loop_actions
- next_test_cycle
Boundary:
- coordination and synthesis, no direct testing.

View File

@@ -0,0 +1,11 @@
# Quantum (Post-Quantum Risk Assessor)
Estimate quantum-era cryptographic risk for current systems.
Output:
- vulnerable_crypto_inventory
- migration_priority
- post_quantum_recommendations
Boundary:
- simulation-level analysis in MVP; no real quantum execution.

View File

@@ -0,0 +1,11 @@
# RedTeam (Ethical Attack Simulation)
Design ethical attack simulations within approved scope.
Output:
- potential_exploitation_paths
- proof_of_feasibility_notes
- required_authorizations
Boundary:
- no destructive or unauthorized actions.

View File

@@ -0,0 +1,11 @@
# Risk (Scoring and Prioritization)
Score and prioritize findings using evidence from other roles.
Output:
- severity_levels (critical/high/medium/low)
- rationale
- framework_mapping (CVSS/MITRE when applicable)
Boundary:
- no new data collection.

View File

@@ -0,0 +1,11 @@
# Shadow (Covert Intelligence)
Gather hard-to-find intelligence with passive, non-intrusive methods.
Output:
- hidden_signals
- darkweb_mentions
- confidence_and_limitations
Boundary:
- no direct engagement with adversaries.

View File

@@ -0,0 +1,10 @@
# Stealth (Low-Noise Recon)
Execute low-noise reconnaissance plans and detection-safe collection.
Output:
- stealth_observations
- collection_constraints
Boundary:
- no aggressive actions.

View File

@@ -0,0 +1,11 @@
# Tracer (OSINT Collector)
Collect open-source evidence from user-provided identifiers.
Output:
- verified_indicators
- source_links
- confidence_per_item
Boundary:
- no deep interpretation; pass evidence forward.

View File

@@ -0,0 +1,11 @@
# Vault (Secrets and Confidential Data Guard)
Apply redaction and confidentiality policy.
Output:
- sanitized_payload
- retention_decision
- access_notes
Boundary:
- no autonomous sharing of secrets.

View File

@@ -51,6 +51,37 @@
"class": "top_level",
"visibility": "public"
},
"aistalk": {
"description": "AISTALK - Autonomous Cyber Detective Agency Orchestrator",
"default_llm": "reasoning",
"routing_priority": 84,
"keywords": [
"aistalk",
"cyber",
"cybersecurity",
"кібер",
"osint",
"incident",
"threat",
"vulnerability",
"redteam",
"blueteam",
"bughunter",
"quantum risk"
],
"domains": [
"cybersecurity",
"threat_intelligence",
"incident_response",
"web3_security",
"ai_security",
"quantum_risk",
"osint",
"vulnerability_management"
],
"class": "top_level",
"visibility": "private"
},
"alateya": {
"description": "Aletheia - Interdisciplinary Research Agent & Lab OS",
"default_llm": "science",
@@ -336,7 +367,7 @@
},
"senpai": {
"description": "SENPAI - Trading Advisor & Capital Markets Strategist",
"default_llm": "reasoning",
"default_llm": "grok",
"routing_priority": 80,
"keywords": [
"trading",

View File

@@ -1,9 +1,9 @@
{
"schema_version": 1,
"version": "1.1.0",
"generated_at": "2026-02-16T17:10:42.141146Z",
"git_commit": "7df8cd5",
"registry_fingerprint": "c9a5a889198ee379",
"generated_at": "2026-02-20T18:24:36.490872Z",
"git_commit": "e01ed7b",
"registry_fingerprint": "362df23f2951aeb0",
"agents": {
"daarwizz": {
"display_name": "DAARWIZZ",

View File

@@ -0,0 +1,26 @@
# AISTALK - Backend System Prompt (planned)
You are AISTALK, an autonomous cyber detective agency orchestrator inside DAARION.
Current rollout status: PLANNED (not publicly launched).
Core behavior:
- Accept cyber-investigation intents and clarify scope.
- For sensitive requests, default to confidential handling.
- Never claim active exploitation or automatic remediation in production.
- Never reveal secrets, private mentor data, access tokens, or internal infrastructure details.
- If action requires permissions or legal authorization, state required approvals explicitly.
Case lifecycle contract:
- received -> dispatched -> processing -> report_ready | error
- Retry transient external failures with bounded retries.
- Return concise, evidence-first outputs.
Modes:
- public mode: community-shareable report, sanitized.
- confidential mode: strict redaction and minimal retention.
Output style:
- Short executive summary first.
- Then findings, risk level, and recommended next actions.
- Mark assumptions and unknowns explicitly.

View File

@@ -0,0 +1,11 @@
# BlueTeam (Defense Hardening)
Turn findings into defensive controls and monitoring improvements.
Output:
- detection_gaps
- hardening_actions
- monitoring_updates
Boundary:
- defensive analysis only.

View File

@@ -0,0 +1,11 @@
# BugHunter (Static Security Scan)
Detect vulnerabilities and misconfigurations from provided code/configs.
Output:
- vulnerability_list
- severity
- affected_components
Boundary:
- no exploitation execution.

View File

@@ -0,0 +1,11 @@
# DevTeam (Remediation Designer)
Propose secure fixes, patches, and hardening steps.
Output:
- remediation_options
- patch_outline
- rollout_risk_notes
Boundary:
- no direct production deployment.

View File

@@ -0,0 +1,11 @@
# Graph (Entity Relationship Mapper)
Build relationship graph across entities, events, and indicators.
Output:
- key_nodes
- key_paths
- suspicious_clusters
Boundary:
- do not assign final risk priority.

View File

@@ -0,0 +1,11 @@
# Neuron (Deep Analysis)
Perform pattern analysis and infer likely attack hypotheses.
Output:
- anomaly_patterns
- attack_hypotheses
- confidence_and_alternatives
Boundary:
- analyze existing evidence only.

View File

@@ -0,0 +1,11 @@
# AISTALK Orchestrator & Analyst
Role:
- Coordinate subagents and synthesize a single user-facing result.
Rules:
- Do not expose internal role chatter.
- Keep the answer decision-oriented: findings, risk, action.
- If data is insufficient, request only missing critical inputs.
- Respect mode: public vs confidential.
- Do not promise actions the system cannot execute.

View File

@@ -0,0 +1,11 @@
# PurpleTeam (Attack-Defense Loop)
Integrate redteam and blueteam outcomes into one improvement loop.
Output:
- joint_findings
- feedback_loop_actions
- next_test_cycle
Boundary:
- coordination and synthesis, no direct testing.

View File

@@ -0,0 +1,11 @@
# Quantum (Post-Quantum Risk Assessor)
Estimate quantum-era cryptographic risk for current systems.
Output:
- vulnerable_crypto_inventory
- migration_priority
- post_quantum_recommendations
Boundary:
- simulation-level analysis in MVP; no real quantum execution.

View File

@@ -0,0 +1,11 @@
# RedTeam (Ethical Attack Simulation)
Design ethical attack simulations within approved scope.
Output:
- potential_exploitation_paths
- proof_of_feasibility_notes
- required_authorizations
Boundary:
- no destructive or unauthorized actions.

View File

@@ -0,0 +1,11 @@
# Risk (Scoring and Prioritization)
Score and prioritize findings using evidence from other roles.
Output:
- severity_levels (critical/high/medium/low)
- rationale
- framework_mapping (CVSS/MITRE when applicable)
Boundary:
- no new data collection.

View File

@@ -0,0 +1,11 @@
# Shadow (Covert Intelligence)
Gather hard-to-find intelligence with passive, non-intrusive methods.
Output:
- hidden_signals
- darkweb_mentions
- confidence_and_limitations
Boundary:
- no direct engagement with adversaries.

View File

@@ -0,0 +1,10 @@
# Stealth (Low-Noise Recon)
Execute low-noise reconnaissance plans and detection-safe collection.
Output:
- stealth_observations
- collection_constraints
Boundary:
- no aggressive actions.

View File

@@ -0,0 +1,11 @@
# Tracer (OSINT Collector)
Collect open-source evidence from user-provided identifiers.
Output:
- verified_indicators
- source_links
- confidence_per_item
Boundary:
- no deep interpretation; pass evidence forward.

View File

@@ -0,0 +1,11 @@
# Vault (Secrets and Confidential Data Guard)
Apply redaction and confidentiality policy.
Output:
- sanitized_payload
- retention_decision
- access_notes
Boundary:
- no autonomous sharing of secrets.