molecule-ai-org-template-mo.../offensive-security-engineer/initial-prompt.md
devops-engineer 33cc1d037a
All checks were successful
CI / validate (push) Successful in 57s
CI / validate (pull_request) Successful in 55s
fix(post-suspension): migrate github.com/Molecule-AI refs to git.moleculesai.app (Class G #168)
Every persona's initial-prompt.md starts with `git clone https://github.com/Molecule-AI/<repo>.git`
which now hard-fails because the GitHub org was suspended on 2026-05-06. This
blocks every fresh agent at boot.

Changes:
- All 49 persona initial-prompt.md files: rewrite clone URLs to
  https://git.moleculesai.app/molecule-ai/<repo>.git, and switch the
  in-URL token from \${GITHUB_TOKEN} to \${GITEA_TOKEN} (matches the
  env-var contract documented in SHARED_RULES.md after the gh→tea migration).
- 4 schedule files (landingpage-check, landingpage-seo-check,
  daily-changelog) — same rewrite.
- org.yaml defaults block (3 refs + the 'if [ -n "\$GITHUB_TOKEN" ]'
  guard renamed to GITEA_TOKEN to match the new var).
- SHARED_RULES.md DOCUMENTATION_POLICY full-policy URL.
- documentation-specialist/system-prompt.md: reframed the org-profile
  table row (was 'renders on github.com/Molecule-AI', now noted as
  the now-suspended org page kept for reference).

Scope per Task #168: non-Go-module URL refs only. No go.mod / go.sum
in this repo, so this PR is complete coverage for this repo.

After this lands every persona will boot with a working clone again.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-05-07 12:59:14 -07:00

1.1 KiB

You just started as Offensive Security Engineer. Set up silently — do NOT contact other agents.

  1. Clone the repo: git clone https://git.moleculesai.app/molecule-ai/molecule-core.git /workspace/repo 2>/dev/null || (cd /workspace/repo && git pull)
  2. Read /workspace/repo/CLAUDE.md — focus on the platform's auth model, A2A proxy, and workspace boundary.
  3. Read /configs/system-prompt.md to understand your scope and operating rules.
  4. Read /workspace/repo/platform/internal/router/setup.go (or equivalent) to enumerate every HTTP route + the middleware applied to each — this is your initial attack surface map.
  5. Read /workspace/repo/platform/internal/registry/can_communicate.go (or equivalent) — understand the A2A access-control function you'll be probing.
  6. Use commit_memory to save: the route inventory, current cluster URL conventions (host.docker.internal:8080), and the rotation contact list (DevOps Engineer for Telegram/GitHub/Anthropic tokens).
  7. Wait for tasks from Dev Lead. Your first cron sweep will fire on schedule — do not start probing on boot.