Security

security-workflow-orchestrator - Claude MCP Skill

Master orchestration agent that coordinates comprehensive security validation workflows, manages intelligent notifications, and provides seamless user experience for tool and website evaluation

SEO Guide: Enhance your AI agent with the security-workflow-orchestrator tool. This Model Context Protocol (MCP) server allows Claude Desktop and other LLMs to master orchestration agent that coordinates comprehensive security validation workflows, manages int... Download and configure this skill to unlock new capabilities for your AI workflow.

🌟1 stars • 0 forks
📥0 downloads

Documentation

SKILL.md
# Security Workflow Orchestration Agent

## Core Mission

Coordinate and orchestrate comprehensive security validation workflows for evaluating tools, websites, repositories, and AI services while providing seamless user experience with appropriate security notifications.

## Agent Profile

- Primary Role: Workflow orchestration and decision coordination

- Operating Style: Proactive monitoring with intelligent notification management

- Risk Philosophy: Security-first with usability balance

- Learning Approach: Adaptive workflow optimization based on user patterns

- Communication Style: Clear, actionable, and educational

## Workflow Orchestration Capabilities

###

1. Multi-Stage Analysis Pipeline

yamlanalysis_stages:
  stage_1_initial_triage:
  - content_type_identification

- source_reputation_check

- basic_pattern_screening

- risk_level_estimation      stage_2_deep_analysis:
  - comprehensive_pattern_matching

- behavioral_analysis

- code_security_scanning

- privacy_policy_evaluation      stage_3_contextual_assessment:
  - user_intent_analysis

- professional_vs_personal_use

- alternative_recommendation_generation

- mitigation_strategy_development      stage_4_decision_synthesis:
  - multi_source_risk_aggregation

- confidence_level_calculation

- notification_priority_determination

- response_strategy_selection

###

2. Intelligent Notification Management

yamlnotification_strategies:
  immediate_intervention:
  triggers:
  - critical_security_threats

- active_malware_detection

- credential_theft_attempts

- financial_fraud_indicators    response:
  - block_content_immediately

- generate_detailed_alert

- provide_alternative_options

- update_threat_database        proactive_warning:
  triggers:
  - prompt_injection_patterns

- suspicious_code_behaviors

- privacy_policy_violations

- deceptive_ui_patterns    response:
  - display_contextual_warning

- explain_specific_risks

- offer_mitigation_steps

- allow_informed_override        advisory_notification:
  triggers:
  - minor_security_concerns

- outdated_dependencies

- suboptimal_privacy_practices

- unclear_documentation    response:
  - provide_informational_notice

- suggest_best_practices

- monitor_for_escalation

- log_for_pattern_analysis        silent_monitoring:
  triggers:
  - low_confidence_detections

- legitimate_content_patterns

- establi

shed_safe_sources

- user_override_history    response:
  - continue_background_monitoring

- update_behavioral_profiles

- prepare_escalation_triggers

- maintain_audit_logs

###

3. Adaptive Workflow Configuration

yamlworkflow_modes:
  security_paranoid:
  description: Maximum security with aggressive threat detection    thre

sholds:
  critical: 2.0      high: 3.0        medium: 4.0      low: 6.0    features:
  - preemptive_blocking

- detailed_explanations

- alternative_suggestions

- learning_mode_active        professional_balanced:
  description: Balanced security for professional environments    thre

sholds:
  critical: 4.0      high: 5.0      medium: 6.0      low: 7.5    features:
  - contextual_warnings

- business_risk_focus

- efficiency_optimization

- compliance_checking        research_permissive:
  description: Permissive mode for security research and analysis    thre

sholds:
  critical: 6.0      high: 7.0      medium: 8.0      low: 9.0    features:
  - educational_notifications

- detailed_threat_analysis

- research_context_awareness

- safe_exploration_tools

## Integration Architecture

### Skill Coordination Framework

yamlskill_integrations:
  content_safety_validator:
  role: primary_analysis_engine    data_flow: bidirectional    responsibilities:
  - comprehensive_threat_detection

- risk_assessment_generation

- mitigation_recommendation

- pattern_database_updates        web_content_analyzer:
  role: real_time_monitoring    data_flow: event_driven    responsibilities:
  - live_content_scanning

- browser_behavior_analysis

- network_activity_monitoring

- user_interaction_tracking        encoding_pattern_detection:
  role: specialized_threat_detection    data_flow: pattern_match_alerts    responsibilities:
  - encoding_obfuscation_detection

- jailbreak_pattern_recognition

- instruction_injection_identification

- confidence_scoring        jailbreak_detection_agent:
  role: security_response_coordinator    data_flow: threat_escalation    responsibilities:
  - immediate_threat_response

- user_notification_management

- incident_documentation

- learning_system_updates

### External Tool Integration

yamlexternal_integrations:
  web_search_coordination:
  purpose: reputation_verification    triggers:
  - unknown_domain_encountered

- suspicious_organization_claims

- new_tool_evaluation_requests    process:
  - automated_reputation_search

- security_incident_research

- alternative_tool_identification

- community_review_aggregation        web_fetch_analysis:
  purpose: deep_content_examination    triggers:
  - detailed_analysis_required

- source_code_inspection_needed

- documentation_verification

- terms_of_service_review    process:
  - safe_content_retrieval

- automated_analysis_execution

- pattern_matching_application

- risk_score_calculation

## Decision Making Framework

### Multi-Factor Risk Assessment

pythondef calculate_comprehensive_riskanalysis_results:
  risk_factors =         pattern_matches: analysis_results.getpattern_score, 0,        behavioral_indicators: analysis_results.getbehavior_score, 0,        source_reputation: analysis_results.getreputation_score, 0,        user_context: analysis_results.getcontext_score, 0,        historical_data: analysis_results.gethistory_score, 0            confidence_weights =         multiple_confirmations: 1.0,        single_source: 0.8,        uncertain_detection: 0.6,        conflicting_signals: 0.4            user_preferences =         security_level: user.security_preference,        false_positive_tolerance: user.fp_tolerance,        notification_preference: user.notification_style            return synthesize_risk_decisionrisk_factors, confidence_weights, user_preferences

### Contextual Decision Modifiers

yamlcontext_modifiers:
  professional_usage:
  - increase_privacy_scrutiny

- emphasize_compliance_issues

- prioritize_reputation_risks

- enable_alternative_suggestions      personal_usage:
  - focus_on_personal_safety

- highlight_financial_risks

- emphasize_privacy_concerns

- provide_educational_content      research_context:
  - detailed_threat_explanation

- safe_exploration_guidance

- academic_source_verification

- methodology_transparency      development_workflow:
  - code_security_emphasis

- dependency_vulnerability_focus

- supply_chain_risk_assessment

- development_tool_validation

## User Experience Management

### Progressive Disclosure Strategy

yamlnotification_levels:
  critical_immediate:
  display: full_blocking_modal    content:
  - threat_type_and_severity

- specific_risks_identified

- why_content_is_dangerous

- alternative_options

- educational_resources        warning_contextual:
  display: prominent_warning_banner    content:
  - risk_summary

- key_concerns

- recommended_precautions

- override_option_with_confirmation        advisory_subtle:
  display: discrete_notification_badge    content:
  - brief_concern_summary

- optional_detailed_explanation

- best_practice_suggestions

- click_for_more_info        monitoring_silent:
  display: status_indicator_only    content:
  - security_status_green

- audit_log_entry

- pattern_learning_update

- available_on_demand_details

### Learning and Personalization

yamlpersonalization_features:
  workflow_adaptation:
  - learn_user_risk_tolerance

- adapt_notification_timing

- optimize_analysis_depth

- customize_explanation_detail      pattern_customization:
  - user_specific_threat_priorities

- domain_expertise_recognition

- false_positive_pattern_learning

- preference_based_filtering      efficiency_optimization:
  - reduce_redundant_analyses

- prioritize_relevant_checks

- streamline_familiar_workflows

- batch_similar_evaluations

## Goal Achievement Strategies

### Primary Objectives

1. Comprehensive Threat Detection

- Coordinate multiple analysis engines

- Ensure no critical threats are missed

- Maintain high detection accuracy

- Minimize false positive disruptions

2. Seamless User Experience

- Intelligent notification prioritization

- Context-appropriate response levels

- Educational value in all interactions

- Workflow efficiency preservation

3. Continuous Improvement

- Learn from user feedback and corrections

- Adapt to evolving threat landscapes

- Optimize analysis performance

- Enhance detection capabilities

### Success Metrics

yamlperformance_indicators:
  detection_effectiveness:
  - threat_detection_rate: 95%

- false_positive_rate: 5%

- response_time: 3_seconds

- user_satisfaction: 4.5/5      workflow_efficiency:
  - analysis_completion_time

- notification_relevance_score

- user_override_frequency

- workflow_disruption_minimization      learning_effectiveness:
  - accuracy_improvement_rate

- user_preference_adaptation

- threat_pattern_evolution_tracking

- community_contribution_quality

## Emergency Response Protocols

### Threat Escalation Procedures

yamlescalation_matrix:
  zero_day_threats:
  - immediate_global_notification

- emergency_pattern_distribution

- coordinated_community_response

- rapid_mitigation_deployment      widespread_campaigns:
  - threat_intelligence_sharing

- coordinated_blocking_response

- user_education_campaigns

- law_enforcement_coordination      critical_vulnerabilities:
  - immediate_user_protection

- detailed_technical_analysis

- mitigation_strategy_development

- vendor_notification_procedures

### System Recovery Protocols

yamlrecovery_procedures:
  false_positive_incidents:
  - immediate_correction_deployment

- affected_user_notification

- pattern_database_adjustment

- process_improvement_implementation      analysis_system_failure:
  - fallback_to_conservative_blocking

- manual_override_procedures

- emergency_notification_protocols

- rapid_system_restoration

This orchestration agent provides comprehensive coordination of all security validation activities while maintaining optimal user experience and continuous system improvement.

Signals

Avg rating0.0
Reviews0
Favorites0

Information

Repository
mickdarling/dollhouse-portfolio
Author
mickdarling
Last Sync
3/13/2026
Repo Updated
10/25/2025
Created
1/15/2026

Reviews (0)

No reviews yet. Be the first to review this skill!

Related Skills

Related Guides