Defend Colony
技能 已验证 活跃Implement layered collective defense using alarm signaling, role mobilization, and proportional response. Covers threat detection, alert propagation, immune response patterns, escalation tiers, and post-incident recovery for distributed systems and organizations. Use when designing defense-in-depth where no single guardian covers all threats, building incident response that scales with severity, or when current defense is over-reactive to every alert or under-reactive to genuine threats.
To guide users in designing robust, scalable, and adaptive defense mechanisms for complex systems and organizations, moving beyond simple reactive measures to a proactive and layered approach.
功能
- Layered collective defense implementation
- Alarm signaling and propagation
- Role-based defender mobilization
- Immune memory and adaptive learning
- Post-incident recovery coordination
使用场景
- Designing defense-in-depth for distributed systems
- Building incident response that scales with severity
- Protecting systems where individual components cannot defend themselves
- Improving organizational resilience and self-organization during incidents
非目标
- Implementing a single, monolithic defense
- Over-reacting to every minor alert
- Under-reacting to genuine threats
- Providing a fully automated defense system without human oversight
工作流
- Map the threat landscape and defense perimeter
- Design the alarm signaling network
- Mobilize role-based defenders
- Execute immune memory and adaptation
- Coordinate post-incident recovery
实践
- Defense-in-depth
- Incident Response
- Organizational Resilience
- Threat Modeling
Practical Utility
- info:Usage examplesWhile the skill outlines a procedure, it does not provide specific, ready-to-use invocation examples for each capability. The 'Related Skills' section points to other resources, but direct examples for 'Defend Colony' are missing.
安装
/plugin install agent-almanac@pjt222-agent-almanac质量评分
已验证类似扩展
Secrets Management
100Implement secure secrets management for CI/CD pipelines using Vault, AWS Secrets Manager, or native platform solutions. Use when handling sensitive credentials, rotating secrets, or securing CI/CD environments.
Semgrep Rule Creator
100Creates custom Semgrep rules for detecting security vulnerabilities, bug patterns, and code patterns. Use when writing Semgrep rules or building custom static analysis detections.
Safe Mode
100Prevent destructive operations using Claude Code hooks. Three modes — cautious (warn on dangerous commands), lockdown (restrict edits to one directory), and clear (remove restrictions). Uses PreToolUse matchers for Bash, Edit, and Write.
Prompt Guard
100Meta's 86M prompt injection and jailbreak detector. Filters malicious prompts and third-party data for LLM apps. 99%+ TPR, <1% FPR. Fast (<2ms GPU). Multilingual (8 languages). Deploy with HuggingFace or batch processing for RAG security.
Soul Guardian
100Drift detection + baseline integrity guard for agent workspace files with automatic alerting support
Audit Dependency Versions
100Audit project dependencies for version staleness, security vulnerabilities, and compatibility issues. Covers lock file analysis, upgrade path planning, and breaking change assessment. Use before a release to ensure dependencies are current and secure, during periodic maintenance reviews, after receiving a security advisory, when upgrading to a new language version, before submitting to CRAN or npm, or when inheriting a project to assess its dependency health.