初始化提交
Some checks failed
CI / Check / macos-latest (push) Has been cancelled
CI / Check / ubuntu-latest (push) Has been cancelled
CI / Check / windows-latest (push) Has been cancelled
CI / Test / macos-latest (push) Has been cancelled
CI / Test / ubuntu-latest (push) Has been cancelled
CI / Test / windows-latest (push) Has been cancelled
CI / Clippy (push) Has been cancelled
CI / Format (push) Has been cancelled
CI / Security Audit (push) Has been cancelled
CI / Secrets Scan (push) Has been cancelled
CI / Install Script Smoke Test (push) Has been cancelled
Some checks failed
CI / Check / macos-latest (push) Has been cancelled
CI / Check / ubuntu-latest (push) Has been cancelled
CI / Check / windows-latest (push) Has been cancelled
CI / Test / macos-latest (push) Has been cancelled
CI / Test / ubuntu-latest (push) Has been cancelled
CI / Test / windows-latest (push) Has been cancelled
CI / Clippy (push) Has been cancelled
CI / Format (push) Has been cancelled
CI / Security Audit (push) Has been cancelled
CI / Secrets Scan (push) Has been cancelled
CI / Install Script Smoke Test (push) Has been cancelled
This commit is contained in:
54
agents/security-auditor/agent.toml
Normal file
54
agents/security-auditor/agent.toml
Normal file
@@ -0,0 +1,54 @@
|
||||
name = "security-auditor"
|
||||
version = "0.1.0"
|
||||
description = "Security specialist. Reviews code for vulnerabilities, checks configurations, performs threat modeling."
|
||||
author = "openfang"
|
||||
module = "builtin:chat"
|
||||
tags = ["security", "audit", "vulnerability"]
|
||||
|
||||
[model]
|
||||
provider = "deepseek"
|
||||
model = "deepseek-chat"
|
||||
api_key_env = "DEEPSEEK_API_KEY"
|
||||
max_tokens = 4096
|
||||
temperature = 0.2
|
||||
system_prompt = """You are Security Auditor, a cybersecurity expert running inside the OpenFang Agent OS.
|
||||
|
||||
Your focus areas:
|
||||
- OWASP Top 10 vulnerabilities
|
||||
- Input validation and sanitization
|
||||
- Authentication and authorization flaws
|
||||
- Cryptographic misuse
|
||||
- Injection attacks (SQL, command, XSS, SSTI)
|
||||
- Insecure deserialization
|
||||
- Secrets management (hardcoded keys, env vars)
|
||||
- Dependency vulnerabilities
|
||||
- Race conditions and TOCTOU bugs
|
||||
- Privilege escalation paths
|
||||
|
||||
When auditing code:
|
||||
1. Map the attack surface
|
||||
2. Trace data flow from untrusted inputs
|
||||
3. Check trust boundaries
|
||||
4. Review error handling (info leaks)
|
||||
5. Assess cryptographic implementations
|
||||
6. Check dependency versions
|
||||
|
||||
Severity levels: CRITICAL / HIGH / MEDIUM / LOW / INFO
|
||||
Report format: Finding → Impact → Evidence → Remediation"""
|
||||
|
||||
[[fallback_models]]
|
||||
provider = "groq"
|
||||
model = "llama-3.3-70b-versatile"
|
||||
api_key_env = "GROQ_API_KEY"
|
||||
|
||||
[schedule]
|
||||
proactive = { conditions = ["event:agent_spawned", "event:agent_terminated"] }
|
||||
|
||||
[resources]
|
||||
max_llm_tokens_per_hour = 150000
|
||||
|
||||
[capabilities]
|
||||
tools = ["file_read", "file_list", "shell_exec", "memory_store", "memory_recall"]
|
||||
memory_read = ["*"]
|
||||
memory_write = ["self.*", "shared.*"]
|
||||
shell = ["cargo audit *", "cargo tree *", "git log *"]
|
||||
Reference in New Issue
Block a user