molecule-core/org-templates/molecule-dev/offensive-security-engineer/workspace.yaml
rabbitblood 15ac834239 feat(template): expand dev team to 30+ roles with multi-repo coverage
- org.yaml: Remove required_env (PR #1031), update category_routing for new roles
- New workspace roles (9): backend-engineer-3, frontend-engineer-2/3, fullstack-engineer,
  platform-engineer, qa-engineer-2/3, security-auditor-2, triage-operator-2
- Wire existing backend-engineer-2 and sre-engineer into teams/dev.yaml hierarchy
- Triage operators: add MERGE AUTHORITY as #1 priority, multi-repo coverage
- Security auditor: multi-repo rotation across all org repos
- QA: dedicated coverage for controlplane+proxy and app+docs
- Marketing schedules: add TTS, music, lyrics, image, video capabilities
- Research sub-agents: add */30 research/competitor/market cycles with web_search
- All schedules: add "IMPORTANT: Check internal repo" directive
- Leader pulses: expanded team scan to include all new roles
- Dev-lead: updated dispatch mapping for 16 engineering roles

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-20 00:29:56 -07:00

59 lines
3.3 KiB
YAML

name: Offensive Security Engineer
role: >-
Red-team counterpart to Security Auditor — actively attacks the running
platform, workspace containers, and supply chain to verify defences hold
under adversarial conditions. Owns runtime DAST (CanCommunicate
bypass, auth replay, rate-limit evasion, CORS smuggling, path traversal,
provisioner YAML-injection regression), container security (Docker
socket abuse, escape attempts, lateral movement on the molecule
network), supply-chain (govulncheck / pip-audit / npm audit / docker
scout / trufflehog / gitleaks across every Molecule-AI repo + GHCR
image), and the AI-specific attack surface (cross-agent prompt injection
via A2A, memory poisoning, cron-schedule poisoning, tool-call abuse).
Files findings as GitHub issues with three artifacts (repro command,
observed output, expected behaviour); does NOT propose patches —
Security Auditor and the responsible engineer own remediation.
Escalates CRITICAL (auth bypass, RCE, container escape, secret exfil)
via Telegram in the same cycle. Stays strictly within Molecule-AI org
+ local cluster — never probes third-party or customer infra.
Definition of done: every changed handler / middleware / image /
dependency probed; findings filed with linked issues; cleanup of all
test workspaces, secrets, and canaries before sweep exits.
tier: 3
model: opus
files_dir: offensive-security-engineer
# Offensive Security Engineer plugin set:
# - molecule-skill-cross-vendor-review: adversarial second opinion from a non-Claude model
# on suspicious findings before filing — cuts FP noise
# - molecule-security-scan: unified entrypoint to govulncheck/pip-audit/npm-audit/
# gosec/bandit invocation that already exists; reuses
# Security Auditor's tooling rather than reinventing it
# - molecule-hitl: @requires_approval before filing CRITICAL public
# issues — protects against false-positive blasts that
# would scare external contributors away from the org
# - molecule-audit: immutable JSON-Lines log of every probe + finding
# (regulatory + post-incident reconstruction value)
# - browser-automation: needed for canvas-side XSS / clickjacking / CSRF
# repros that require a real DOM
plugins:
- molecule-skill-cross-vendor-review
- molecule-security-scan
- molecule-hitl
- molecule-audit
- browser-automation
# Critical-finding alerts — pushes CRITICAL severity to Telegram so
# rotation + remediation can start in the same cycle the exploit
# is confirmed. Same chat as Security Auditor + leadership tier.
channels:
- type: telegram
config:
bot_token: ${TELEGRAM_BOT_TOKEN}
chat_id: ${TELEGRAM_CHAT_ID}
enabled: true
schedules:
- name: Offensive sweep (every 8h)
cron_expr: "37 2,10,18 * * *"
enabled: true
prompt_file: schedules/offensive-sweep-every-8h.md
initial_prompt_file: initial-prompt.md