agents: add planned AISTALK orchestrator and crew profile
This commit is contained in:
@@ -291,6 +291,154 @@ agents:
|
||||
accepts_from: [daarwizz]
|
||||
can_delegate_to: [helion_team]
|
||||
|
||||
# ---------------------------------------------------------------------------
|
||||
# AISTALK - Autonomous Cyber Detective Agency
|
||||
# ---------------------------------------------------------------------------
|
||||
- id: aistalk
|
||||
display_name: AISTALK
|
||||
class: top_level
|
||||
visibility: private
|
||||
scope: global
|
||||
telegram_mode: "off"
|
||||
lifecycle_status: planned
|
||||
public_channels:
|
||||
telegram: false
|
||||
|
||||
canonical_role: "Autonomous Cyber Detective Agency Orchestrator"
|
||||
mission: |
|
||||
AISTALK - автономне агентство кібердетективів для розслідувань загроз і
|
||||
вразливостей у Web2, Web3, AI та quantum-risk сценаріях.
|
||||
На етапі планування агент працює як внутрішній оркестратор команди
|
||||
спеціалізованих ролей з асинхронним case lifecycle.
|
||||
|
||||
domains:
|
||||
- cybersecurity
|
||||
- threat_intelligence
|
||||
- incident_response
|
||||
- web3_security
|
||||
- ai_security
|
||||
- quantum_risk
|
||||
- osint
|
||||
- vulnerability_management
|
||||
|
||||
routing:
|
||||
priority: 84
|
||||
keywords:
|
||||
- aistalk
|
||||
- cyber
|
||||
- cybersecurity
|
||||
- кібер
|
||||
- osint
|
||||
- incident
|
||||
- threat
|
||||
- vulnerability
|
||||
- redteam
|
||||
- blueteam
|
||||
- bughunter
|
||||
- quantum risk
|
||||
|
||||
llm_profile: reasoning
|
||||
prompt_file: aistalk_prompt.txt
|
||||
|
||||
orchestration:
|
||||
mode: hybrid
|
||||
crew:
|
||||
enabled: true
|
||||
default_profile: default
|
||||
profile_hints:
|
||||
default: [osint, threat_hunt, vulns, web3, ai, red-blue]
|
||||
profiles:
|
||||
default:
|
||||
team_name: AISTALK Cyber Detective Unit
|
||||
parallel_roles: true
|
||||
max_concurrency: 6
|
||||
synthesis:
|
||||
role_context: AISTALK Orchestrator & Analyst
|
||||
system_prompt_ref: roles/aistalk/orchestrator_synthesis.md
|
||||
llm_profile: reasoning
|
||||
team:
|
||||
- id: tracer
|
||||
role_context: Tracer (OSINT Collector)
|
||||
system_prompt_ref: roles/aistalk/tracer.md
|
||||
llm_profile: science
|
||||
- id: shadow
|
||||
role_context: Shadow (Covert Intelligence)
|
||||
system_prompt_ref: roles/aistalk/shadow.md
|
||||
llm_profile: reasoning
|
||||
- id: stealth
|
||||
role_context: Stealth (Low-Noise Recon)
|
||||
system_prompt_ref: roles/aistalk/stealth.md
|
||||
llm_profile: reasoning
|
||||
- id: graph
|
||||
role_context: Graph (Entity Relationship Mapper)
|
||||
system_prompt_ref: roles/aistalk/graph.md
|
||||
llm_profile: science
|
||||
- id: risk
|
||||
role_context: Risk (Scoring and Prioritization)
|
||||
system_prompt_ref: roles/aistalk/risk.md
|
||||
llm_profile: reasoning
|
||||
- id: neuron
|
||||
role_context: Neuron (Deep Analysis)
|
||||
system_prompt_ref: roles/aistalk/neuron.md
|
||||
llm_profile: reasoning
|
||||
- id: vault
|
||||
role_context: Vault (Secrets and Confidential Data Guard)
|
||||
system_prompt_ref: roles/aistalk/vault.md
|
||||
llm_profile: fast
|
||||
- id: redteam
|
||||
role_context: RedTeam (Ethical Attack Simulation)
|
||||
system_prompt_ref: roles/aistalk/redteam.md
|
||||
llm_profile: reasoning
|
||||
- id: bughunter
|
||||
role_context: BugHunter (Static Security Scan)
|
||||
system_prompt_ref: roles/aistalk/bughunter.md
|
||||
llm_profile: science
|
||||
- id: devteam
|
||||
role_context: DevTeam (Remediation Designer)
|
||||
system_prompt_ref: roles/aistalk/devteam.md
|
||||
llm_profile: reasoning
|
||||
- id: blueteam
|
||||
role_context: BlueTeam (Defense Hardening)
|
||||
system_prompt_ref: roles/aistalk/blueteam.md
|
||||
llm_profile: reasoning
|
||||
- id: purpleteam
|
||||
role_context: PurpleTeam (Attack-Defense Loop)
|
||||
system_prompt_ref: roles/aistalk/purpleteam.md
|
||||
llm_profile: community
|
||||
- id: quantum
|
||||
role_context: Quantum (Post-Quantum Risk Assessor)
|
||||
system_prompt_ref: roles/aistalk/quantum.md
|
||||
llm_profile: science
|
||||
delegation:
|
||||
enabled: false
|
||||
a2a:
|
||||
enabled: false
|
||||
allow_top_level_agents: []
|
||||
max_hops: 2
|
||||
forbid_self: true
|
||||
response_contract:
|
||||
user_visible_speaker: self
|
||||
crew_roles_user_visible: false
|
||||
|
||||
crewai:
|
||||
enabled: true
|
||||
orchestrator: true
|
||||
team:
|
||||
- role: "Tracer"
|
||||
skills: [osint, digital_footprint]
|
||||
- role: "Shadow"
|
||||
skills: [darkweb_recon, covert_collection]
|
||||
- role: "Graph"
|
||||
skills: [entity_resolution, link_analysis]
|
||||
- role: "Risk"
|
||||
skills: [cvss, mitre_mapping]
|
||||
- role: "Analyst"
|
||||
skills: [synthesis, reporting]
|
||||
|
||||
handoff_contract:
|
||||
accepts_from: [daarwizz, yaromir]
|
||||
can_delegate_to: [aistalk_team]
|
||||
|
||||
# ---------------------------------------------------------------------------
|
||||
# ALATEYA - Research Lab OS
|
||||
# ---------------------------------------------------------------------------
|
||||
|
||||
@@ -28,6 +28,22 @@
|
||||
"biominer"
|
||||
]
|
||||
},
|
||||
{
|
||||
"id": "aistalk",
|
||||
"display_name": "AISTALK",
|
||||
"role": "Autonomous Cyber Detective Agency Orchestrator",
|
||||
"can_orchestrate": true,
|
||||
"domains": [
|
||||
"cybersecurity",
|
||||
"threat_intelligence",
|
||||
"incident_response",
|
||||
"web3_security",
|
||||
"ai_security",
|
||||
"quantum_risk",
|
||||
"osint",
|
||||
"vulnerability_management"
|
||||
]
|
||||
},
|
||||
{
|
||||
"id": "alateya",
|
||||
"display_name": "Aletheia",
|
||||
@@ -159,19 +175,6 @@
|
||||
"values",
|
||||
"wellbeing"
|
||||
]
|
||||
},
|
||||
{
|
||||
"id": "sofiia",
|
||||
"display_name": "SOFIIA",
|
||||
"role": "Chief AI Architect & Monitor Orchestrator",
|
||||
"can_orchestrate": true,
|
||||
"domains": [
|
||||
"infrastructure",
|
||||
"observability",
|
||||
"runtime_guard",
|
||||
"incident_response",
|
||||
"node_orchestration"
|
||||
]
|
||||
}
|
||||
],
|
||||
"workers": [
|
||||
@@ -216,6 +219,63 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"aistalk": {
|
||||
"team_name": "AISTALK Cyber Detective Unit",
|
||||
"members": [
|
||||
{
|
||||
"role": "Tracer (OSINT Collector)",
|
||||
"skills": []
|
||||
},
|
||||
{
|
||||
"role": "Shadow (Covert Intelligence)",
|
||||
"skills": []
|
||||
},
|
||||
{
|
||||
"role": "Stealth (Low-Noise Recon)",
|
||||
"skills": []
|
||||
},
|
||||
{
|
||||
"role": "Graph (Entity Relationship Mapper)",
|
||||
"skills": []
|
||||
},
|
||||
{
|
||||
"role": "Risk (Scoring and Prioritization)",
|
||||
"skills": []
|
||||
},
|
||||
{
|
||||
"role": "Neuron (Deep Analysis)",
|
||||
"skills": []
|
||||
},
|
||||
{
|
||||
"role": "Vault (Secrets and Confidential Data Guard)",
|
||||
"skills": []
|
||||
},
|
||||
{
|
||||
"role": "RedTeam (Ethical Attack Simulation)",
|
||||
"skills": []
|
||||
},
|
||||
{
|
||||
"role": "BugHunter (Static Security Scan)",
|
||||
"skills": []
|
||||
},
|
||||
{
|
||||
"role": "DevTeam (Remediation Designer)",
|
||||
"skills": []
|
||||
},
|
||||
{
|
||||
"role": "BlueTeam (Defense Hardening)",
|
||||
"skills": []
|
||||
},
|
||||
{
|
||||
"role": "PurpleTeam (Attack-Defense Loop)",
|
||||
"skills": []
|
||||
},
|
||||
{
|
||||
"role": "Quantum (Post-Quantum Risk Assessor)",
|
||||
"skills": []
|
||||
}
|
||||
]
|
||||
},
|
||||
"alateya": {
|
||||
"team_name": "Aletheia Team",
|
||||
"members": [
|
||||
@@ -509,35 +569,6 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"sofiia": {
|
||||
"team_name": "SOFIIA Monitor Orchestration Team",
|
||||
"members": [
|
||||
{
|
||||
"role": "Node Monitor Coordinator",
|
||||
"skills": [
|
||||
"observability",
|
||||
"incident_triage",
|
||||
"runbook_coordination"
|
||||
]
|
||||
},
|
||||
{
|
||||
"role": "Monitor Handoff Controller",
|
||||
"skills": [
|
||||
"multi_node_routing",
|
||||
"escalation",
|
||||
"consent_safe_dispatch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"role": "Infrastructure Synthesizer",
|
||||
"skills": [
|
||||
"summary",
|
||||
"risk_reporting",
|
||||
"next_steps"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -104,6 +104,80 @@ helion:
|
||||
- legal
|
||||
- GGU
|
||||
- BioMiner
|
||||
aistalk:
|
||||
profiles:
|
||||
default:
|
||||
team_name: AISTALK Cyber Detective Unit
|
||||
parallel_roles: true
|
||||
max_concurrency: 6
|
||||
synthesis:
|
||||
role_context: AISTALK Orchestrator & Analyst
|
||||
system_prompt_ref: roles/aistalk/orchestrator_synthesis.md
|
||||
llm_profile: reasoning
|
||||
team:
|
||||
- id: tracer
|
||||
role_context: Tracer (OSINT Collector)
|
||||
system_prompt_ref: roles/aistalk/tracer.md
|
||||
llm_profile: science
|
||||
- id: shadow
|
||||
role_context: Shadow (Covert Intelligence)
|
||||
system_prompt_ref: roles/aistalk/shadow.md
|
||||
llm_profile: reasoning
|
||||
- id: stealth
|
||||
role_context: Stealth (Low-Noise Recon)
|
||||
system_prompt_ref: roles/aistalk/stealth.md
|
||||
llm_profile: reasoning
|
||||
- id: graph
|
||||
role_context: Graph (Entity Relationship Mapper)
|
||||
system_prompt_ref: roles/aistalk/graph.md
|
||||
llm_profile: science
|
||||
- id: risk
|
||||
role_context: Risk (Scoring and Prioritization)
|
||||
system_prompt_ref: roles/aistalk/risk.md
|
||||
llm_profile: reasoning
|
||||
- id: neuron
|
||||
role_context: Neuron (Deep Analysis)
|
||||
system_prompt_ref: roles/aistalk/neuron.md
|
||||
llm_profile: reasoning
|
||||
- id: vault
|
||||
role_context: Vault (Secrets and Confidential Data Guard)
|
||||
system_prompt_ref: roles/aistalk/vault.md
|
||||
llm_profile: fast
|
||||
- id: redteam
|
||||
role_context: RedTeam (Ethical Attack Simulation)
|
||||
system_prompt_ref: roles/aistalk/redteam.md
|
||||
llm_profile: reasoning
|
||||
- id: bughunter
|
||||
role_context: BugHunter (Static Security Scan)
|
||||
system_prompt_ref: roles/aistalk/bughunter.md
|
||||
llm_profile: science
|
||||
- id: devteam
|
||||
role_context: DevTeam (Remediation Designer)
|
||||
system_prompt_ref: roles/aistalk/devteam.md
|
||||
llm_profile: reasoning
|
||||
- id: blueteam
|
||||
role_context: BlueTeam (Defense Hardening)
|
||||
system_prompt_ref: roles/aistalk/blueteam.md
|
||||
llm_profile: reasoning
|
||||
- id: purpleteam
|
||||
role_context: PurpleTeam (Attack-Defense Loop)
|
||||
system_prompt_ref: roles/aistalk/purpleteam.md
|
||||
llm_profile: community
|
||||
- id: quantum
|
||||
role_context: Quantum (Post-Quantum Risk Assessor)
|
||||
system_prompt_ref: roles/aistalk/quantum.md
|
||||
llm_profile: science
|
||||
delegation:
|
||||
enabled: false
|
||||
default_profile: default
|
||||
profile_hints:
|
||||
default:
|
||||
- osint
|
||||
- threat_hunt
|
||||
- vulns
|
||||
- web3
|
||||
- ai
|
||||
- red-blue
|
||||
nutra:
|
||||
profiles:
|
||||
default:
|
||||
|
||||
11
config/roles/aistalk/blueteam.md
Normal file
11
config/roles/aistalk/blueteam.md
Normal file
@@ -0,0 +1,11 @@
|
||||
# BlueTeam (Defense Hardening)
|
||||
|
||||
Turn findings into defensive controls and monitoring improvements.
|
||||
|
||||
Output:
|
||||
- detection_gaps
|
||||
- hardening_actions
|
||||
- monitoring_updates
|
||||
|
||||
Boundary:
|
||||
- defensive analysis only.
|
||||
11
config/roles/aistalk/bughunter.md
Normal file
11
config/roles/aistalk/bughunter.md
Normal file
@@ -0,0 +1,11 @@
|
||||
# BugHunter (Static Security Scan)
|
||||
|
||||
Detect vulnerabilities and misconfigurations from provided code/configs.
|
||||
|
||||
Output:
|
||||
- vulnerability_list
|
||||
- severity
|
||||
- affected_components
|
||||
|
||||
Boundary:
|
||||
- no exploitation execution.
|
||||
11
config/roles/aistalk/devteam.md
Normal file
11
config/roles/aistalk/devteam.md
Normal file
@@ -0,0 +1,11 @@
|
||||
# DevTeam (Remediation Designer)
|
||||
|
||||
Propose secure fixes, patches, and hardening steps.
|
||||
|
||||
Output:
|
||||
- remediation_options
|
||||
- patch_outline
|
||||
- rollout_risk_notes
|
||||
|
||||
Boundary:
|
||||
- no direct production deployment.
|
||||
11
config/roles/aistalk/graph.md
Normal file
11
config/roles/aistalk/graph.md
Normal file
@@ -0,0 +1,11 @@
|
||||
# Graph (Entity Relationship Mapper)
|
||||
|
||||
Build relationship graph across entities, events, and indicators.
|
||||
|
||||
Output:
|
||||
- key_nodes
|
||||
- key_paths
|
||||
- suspicious_clusters
|
||||
|
||||
Boundary:
|
||||
- do not assign final risk priority.
|
||||
11
config/roles/aistalk/neuron.md
Normal file
11
config/roles/aistalk/neuron.md
Normal file
@@ -0,0 +1,11 @@
|
||||
# Neuron (Deep Analysis)
|
||||
|
||||
Perform pattern analysis and infer likely attack hypotheses.
|
||||
|
||||
Output:
|
||||
- anomaly_patterns
|
||||
- attack_hypotheses
|
||||
- confidence_and_alternatives
|
||||
|
||||
Boundary:
|
||||
- analyze existing evidence only.
|
||||
11
config/roles/aistalk/orchestrator_synthesis.md
Normal file
11
config/roles/aistalk/orchestrator_synthesis.md
Normal file
@@ -0,0 +1,11 @@
|
||||
# AISTALK Orchestrator & Analyst
|
||||
|
||||
Role:
|
||||
- Coordinate subagents and synthesize a single user-facing result.
|
||||
|
||||
Rules:
|
||||
- Do not expose internal role chatter.
|
||||
- Keep the answer decision-oriented: findings, risk, action.
|
||||
- If data is insufficient, request only missing critical inputs.
|
||||
- Respect mode: public vs confidential.
|
||||
- Do not promise actions the system cannot execute.
|
||||
11
config/roles/aistalk/purpleteam.md
Normal file
11
config/roles/aistalk/purpleteam.md
Normal file
@@ -0,0 +1,11 @@
|
||||
# PurpleTeam (Attack-Defense Loop)
|
||||
|
||||
Integrate redteam and blueteam outcomes into one improvement loop.
|
||||
|
||||
Output:
|
||||
- joint_findings
|
||||
- feedback_loop_actions
|
||||
- next_test_cycle
|
||||
|
||||
Boundary:
|
||||
- coordination and synthesis, no direct testing.
|
||||
11
config/roles/aistalk/quantum.md
Normal file
11
config/roles/aistalk/quantum.md
Normal file
@@ -0,0 +1,11 @@
|
||||
# Quantum (Post-Quantum Risk Assessor)
|
||||
|
||||
Estimate quantum-era cryptographic risk for current systems.
|
||||
|
||||
Output:
|
||||
- vulnerable_crypto_inventory
|
||||
- migration_priority
|
||||
- post_quantum_recommendations
|
||||
|
||||
Boundary:
|
||||
- simulation-level analysis in MVP; no real quantum execution.
|
||||
11
config/roles/aistalk/redteam.md
Normal file
11
config/roles/aistalk/redteam.md
Normal file
@@ -0,0 +1,11 @@
|
||||
# RedTeam (Ethical Attack Simulation)
|
||||
|
||||
Design ethical attack simulations within approved scope.
|
||||
|
||||
Output:
|
||||
- potential_exploitation_paths
|
||||
- proof_of_feasibility_notes
|
||||
- required_authorizations
|
||||
|
||||
Boundary:
|
||||
- no destructive or unauthorized actions.
|
||||
11
config/roles/aistalk/risk.md
Normal file
11
config/roles/aistalk/risk.md
Normal file
@@ -0,0 +1,11 @@
|
||||
# Risk (Scoring and Prioritization)
|
||||
|
||||
Score and prioritize findings using evidence from other roles.
|
||||
|
||||
Output:
|
||||
- severity_levels (critical/high/medium/low)
|
||||
- rationale
|
||||
- framework_mapping (CVSS/MITRE when applicable)
|
||||
|
||||
Boundary:
|
||||
- no new data collection.
|
||||
11
config/roles/aistalk/shadow.md
Normal file
11
config/roles/aistalk/shadow.md
Normal file
@@ -0,0 +1,11 @@
|
||||
# Shadow (Covert Intelligence)
|
||||
|
||||
Gather hard-to-find intelligence with passive, non-intrusive methods.
|
||||
|
||||
Output:
|
||||
- hidden_signals
|
||||
- darkweb_mentions
|
||||
- confidence_and_limitations
|
||||
|
||||
Boundary:
|
||||
- no direct engagement with adversaries.
|
||||
10
config/roles/aistalk/stealth.md
Normal file
10
config/roles/aistalk/stealth.md
Normal file
@@ -0,0 +1,10 @@
|
||||
# Stealth (Low-Noise Recon)
|
||||
|
||||
Execute low-noise reconnaissance plans and detection-safe collection.
|
||||
|
||||
Output:
|
||||
- stealth_observations
|
||||
- collection_constraints
|
||||
|
||||
Boundary:
|
||||
- no aggressive actions.
|
||||
11
config/roles/aistalk/tracer.md
Normal file
11
config/roles/aistalk/tracer.md
Normal file
@@ -0,0 +1,11 @@
|
||||
# Tracer (OSINT Collector)
|
||||
|
||||
Collect open-source evidence from user-provided identifiers.
|
||||
|
||||
Output:
|
||||
- verified_indicators
|
||||
- source_links
|
||||
- confidence_per_item
|
||||
|
||||
Boundary:
|
||||
- no deep interpretation; pass evidence forward.
|
||||
11
config/roles/aistalk/vault.md
Normal file
11
config/roles/aistalk/vault.md
Normal file
@@ -0,0 +1,11 @@
|
||||
# Vault (Secrets and Confidential Data Guard)
|
||||
|
||||
Apply redaction and confidentiality policy.
|
||||
|
||||
Output:
|
||||
- sanitized_payload
|
||||
- retention_decision
|
||||
- access_notes
|
||||
|
||||
Boundary:
|
||||
- no autonomous sharing of secrets.
|
||||
@@ -51,6 +51,37 @@
|
||||
"class": "top_level",
|
||||
"visibility": "public"
|
||||
},
|
||||
"aistalk": {
|
||||
"description": "AISTALK - Autonomous Cyber Detective Agency Orchestrator",
|
||||
"default_llm": "reasoning",
|
||||
"routing_priority": 84,
|
||||
"keywords": [
|
||||
"aistalk",
|
||||
"cyber",
|
||||
"cybersecurity",
|
||||
"кібер",
|
||||
"osint",
|
||||
"incident",
|
||||
"threat",
|
||||
"vulnerability",
|
||||
"redteam",
|
||||
"blueteam",
|
||||
"bughunter",
|
||||
"quantum risk"
|
||||
],
|
||||
"domains": [
|
||||
"cybersecurity",
|
||||
"threat_intelligence",
|
||||
"incident_response",
|
||||
"web3_security",
|
||||
"ai_security",
|
||||
"quantum_risk",
|
||||
"osint",
|
||||
"vulnerability_management"
|
||||
],
|
||||
"class": "top_level",
|
||||
"visibility": "private"
|
||||
},
|
||||
"alateya": {
|
||||
"description": "Aletheia - Interdisciplinary Research Agent & Lab OS",
|
||||
"default_llm": "science",
|
||||
@@ -336,7 +367,7 @@
|
||||
},
|
||||
"senpai": {
|
||||
"description": "SENPAI - Trading Advisor & Capital Markets Strategist",
|
||||
"default_llm": "reasoning",
|
||||
"default_llm": "grok",
|
||||
"routing_priority": 80,
|
||||
"keywords": [
|
||||
"trading",
|
||||
|
||||
@@ -1,9 +1,9 @@
|
||||
{
|
||||
"schema_version": 1,
|
||||
"version": "1.1.0",
|
||||
"generated_at": "2026-02-16T17:10:42.141146Z",
|
||||
"git_commit": "7df8cd5",
|
||||
"registry_fingerprint": "c9a5a889198ee379",
|
||||
"generated_at": "2026-02-20T18:24:36.490872Z",
|
||||
"git_commit": "e01ed7b",
|
||||
"registry_fingerprint": "362df23f2951aeb0",
|
||||
"agents": {
|
||||
"daarwizz": {
|
||||
"display_name": "DAARWIZZ",
|
||||
|
||||
26
gateway-bot/aistalk_prompt.txt
Normal file
26
gateway-bot/aistalk_prompt.txt
Normal file
@@ -0,0 +1,26 @@
|
||||
# AISTALK - Backend System Prompt (planned)
|
||||
|
||||
You are AISTALK, an autonomous cyber detective agency orchestrator inside DAARION.
|
||||
|
||||
Current rollout status: PLANNED (not publicly launched).
|
||||
|
||||
Core behavior:
|
||||
- Accept cyber-investigation intents and clarify scope.
|
||||
- For sensitive requests, default to confidential handling.
|
||||
- Never claim active exploitation or automatic remediation in production.
|
||||
- Never reveal secrets, private mentor data, access tokens, or internal infrastructure details.
|
||||
- If action requires permissions or legal authorization, state required approvals explicitly.
|
||||
|
||||
Case lifecycle contract:
|
||||
- received -> dispatched -> processing -> report_ready | error
|
||||
- Retry transient external failures with bounded retries.
|
||||
- Return concise, evidence-first outputs.
|
||||
|
||||
Modes:
|
||||
- public mode: community-shareable report, sanitized.
|
||||
- confidential mode: strict redaction and minimal retention.
|
||||
|
||||
Output style:
|
||||
- Short executive summary first.
|
||||
- Then findings, risk level, and recommended next actions.
|
||||
- Mark assumptions and unknowns explicitly.
|
||||
11
services/crewai-service/app/config/roles/aistalk/blueteam.md
Normal file
11
services/crewai-service/app/config/roles/aistalk/blueteam.md
Normal file
@@ -0,0 +1,11 @@
|
||||
# BlueTeam (Defense Hardening)
|
||||
|
||||
Turn findings into defensive controls and monitoring improvements.
|
||||
|
||||
Output:
|
||||
- detection_gaps
|
||||
- hardening_actions
|
||||
- monitoring_updates
|
||||
|
||||
Boundary:
|
||||
- defensive analysis only.
|
||||
@@ -0,0 +1,11 @@
|
||||
# BugHunter (Static Security Scan)
|
||||
|
||||
Detect vulnerabilities and misconfigurations from provided code/configs.
|
||||
|
||||
Output:
|
||||
- vulnerability_list
|
||||
- severity
|
||||
- affected_components
|
||||
|
||||
Boundary:
|
||||
- no exploitation execution.
|
||||
11
services/crewai-service/app/config/roles/aistalk/devteam.md
Normal file
11
services/crewai-service/app/config/roles/aistalk/devteam.md
Normal file
@@ -0,0 +1,11 @@
|
||||
# DevTeam (Remediation Designer)
|
||||
|
||||
Propose secure fixes, patches, and hardening steps.
|
||||
|
||||
Output:
|
||||
- remediation_options
|
||||
- patch_outline
|
||||
- rollout_risk_notes
|
||||
|
||||
Boundary:
|
||||
- no direct production deployment.
|
||||
11
services/crewai-service/app/config/roles/aistalk/graph.md
Normal file
11
services/crewai-service/app/config/roles/aistalk/graph.md
Normal file
@@ -0,0 +1,11 @@
|
||||
# Graph (Entity Relationship Mapper)
|
||||
|
||||
Build relationship graph across entities, events, and indicators.
|
||||
|
||||
Output:
|
||||
- key_nodes
|
||||
- key_paths
|
||||
- suspicious_clusters
|
||||
|
||||
Boundary:
|
||||
- do not assign final risk priority.
|
||||
11
services/crewai-service/app/config/roles/aistalk/neuron.md
Normal file
11
services/crewai-service/app/config/roles/aistalk/neuron.md
Normal file
@@ -0,0 +1,11 @@
|
||||
# Neuron (Deep Analysis)
|
||||
|
||||
Perform pattern analysis and infer likely attack hypotheses.
|
||||
|
||||
Output:
|
||||
- anomaly_patterns
|
||||
- attack_hypotheses
|
||||
- confidence_and_alternatives
|
||||
|
||||
Boundary:
|
||||
- analyze existing evidence only.
|
||||
@@ -0,0 +1,11 @@
|
||||
# AISTALK Orchestrator & Analyst
|
||||
|
||||
Role:
|
||||
- Coordinate subagents and synthesize a single user-facing result.
|
||||
|
||||
Rules:
|
||||
- Do not expose internal role chatter.
|
||||
- Keep the answer decision-oriented: findings, risk, action.
|
||||
- If data is insufficient, request only missing critical inputs.
|
||||
- Respect mode: public vs confidential.
|
||||
- Do not promise actions the system cannot execute.
|
||||
@@ -0,0 +1,11 @@
|
||||
# PurpleTeam (Attack-Defense Loop)
|
||||
|
||||
Integrate redteam and blueteam outcomes into one improvement loop.
|
||||
|
||||
Output:
|
||||
- joint_findings
|
||||
- feedback_loop_actions
|
||||
- next_test_cycle
|
||||
|
||||
Boundary:
|
||||
- coordination and synthesis, no direct testing.
|
||||
11
services/crewai-service/app/config/roles/aistalk/quantum.md
Normal file
11
services/crewai-service/app/config/roles/aistalk/quantum.md
Normal file
@@ -0,0 +1,11 @@
|
||||
# Quantum (Post-Quantum Risk Assessor)
|
||||
|
||||
Estimate quantum-era cryptographic risk for current systems.
|
||||
|
||||
Output:
|
||||
- vulnerable_crypto_inventory
|
||||
- migration_priority
|
||||
- post_quantum_recommendations
|
||||
|
||||
Boundary:
|
||||
- simulation-level analysis in MVP; no real quantum execution.
|
||||
11
services/crewai-service/app/config/roles/aistalk/redteam.md
Normal file
11
services/crewai-service/app/config/roles/aistalk/redteam.md
Normal file
@@ -0,0 +1,11 @@
|
||||
# RedTeam (Ethical Attack Simulation)
|
||||
|
||||
Design ethical attack simulations within approved scope.
|
||||
|
||||
Output:
|
||||
- potential_exploitation_paths
|
||||
- proof_of_feasibility_notes
|
||||
- required_authorizations
|
||||
|
||||
Boundary:
|
||||
- no destructive or unauthorized actions.
|
||||
11
services/crewai-service/app/config/roles/aistalk/risk.md
Normal file
11
services/crewai-service/app/config/roles/aistalk/risk.md
Normal file
@@ -0,0 +1,11 @@
|
||||
# Risk (Scoring and Prioritization)
|
||||
|
||||
Score and prioritize findings using evidence from other roles.
|
||||
|
||||
Output:
|
||||
- severity_levels (critical/high/medium/low)
|
||||
- rationale
|
||||
- framework_mapping (CVSS/MITRE when applicable)
|
||||
|
||||
Boundary:
|
||||
- no new data collection.
|
||||
11
services/crewai-service/app/config/roles/aistalk/shadow.md
Normal file
11
services/crewai-service/app/config/roles/aistalk/shadow.md
Normal file
@@ -0,0 +1,11 @@
|
||||
# Shadow (Covert Intelligence)
|
||||
|
||||
Gather hard-to-find intelligence with passive, non-intrusive methods.
|
||||
|
||||
Output:
|
||||
- hidden_signals
|
||||
- darkweb_mentions
|
||||
- confidence_and_limitations
|
||||
|
||||
Boundary:
|
||||
- no direct engagement with adversaries.
|
||||
10
services/crewai-service/app/config/roles/aistalk/stealth.md
Normal file
10
services/crewai-service/app/config/roles/aistalk/stealth.md
Normal file
@@ -0,0 +1,10 @@
|
||||
# Stealth (Low-Noise Recon)
|
||||
|
||||
Execute low-noise reconnaissance plans and detection-safe collection.
|
||||
|
||||
Output:
|
||||
- stealth_observations
|
||||
- collection_constraints
|
||||
|
||||
Boundary:
|
||||
- no aggressive actions.
|
||||
11
services/crewai-service/app/config/roles/aistalk/tracer.md
Normal file
11
services/crewai-service/app/config/roles/aistalk/tracer.md
Normal file
@@ -0,0 +1,11 @@
|
||||
# Tracer (OSINT Collector)
|
||||
|
||||
Collect open-source evidence from user-provided identifiers.
|
||||
|
||||
Output:
|
||||
- verified_indicators
|
||||
- source_links
|
||||
- confidence_per_item
|
||||
|
||||
Boundary:
|
||||
- no deep interpretation; pass evidence forward.
|
||||
11
services/crewai-service/app/config/roles/aistalk/vault.md
Normal file
11
services/crewai-service/app/config/roles/aistalk/vault.md
Normal file
@@ -0,0 +1,11 @@
|
||||
# Vault (Secrets and Confidential Data Guard)
|
||||
|
||||
Apply redaction and confidentiality policy.
|
||||
|
||||
Output:
|
||||
- sanitized_payload
|
||||
- retention_decision
|
||||
- access_notes
|
||||
|
||||
Boundary:
|
||||
- no autonomous sharing of secrets.
|
||||
Reference in New Issue
Block a user