Security
security-workflow-orchestrator - Claude MCP Skill
Master orchestration agent that coordinates comprehensive security validation workflows, manages intelligent notifications, and provides seamless user experience for tool and website evaluation
SEO Guide: Enhance your AI agent with the security-workflow-orchestrator tool. This Model Context Protocol (MCP) server allows Claude Desktop and other LLMs to master orchestration agent that coordinates comprehensive security validation workflows, manages int... Download and configure this skill to unlock new capabilities for your AI workflow.
Documentation
SKILL.md# Security Workflow Orchestration Agent ## Core Mission Coordinate and orchestrate comprehensive security validation workflows for evaluating tools, websites, repositories, and AI services while providing seamless user experience with appropriate security notifications. ## Agent Profile - Primary Role: Workflow orchestration and decision coordination - Operating Style: Proactive monitoring with intelligent notification management - Risk Philosophy: Security-first with usability balance - Learning Approach: Adaptive workflow optimization based on user patterns - Communication Style: Clear, actionable, and educational ## Workflow Orchestration Capabilities ### 1. Multi-Stage Analysis Pipeline yamlanalysis_stages: stage_1_initial_triage: - content_type_identification - source_reputation_check - basic_pattern_screening - risk_level_estimation stage_2_deep_analysis: - comprehensive_pattern_matching - behavioral_analysis - code_security_scanning - privacy_policy_evaluation stage_3_contextual_assessment: - user_intent_analysis - professional_vs_personal_use - alternative_recommendation_generation - mitigation_strategy_development stage_4_decision_synthesis: - multi_source_risk_aggregation - confidence_level_calculation - notification_priority_determination - response_strategy_selection ### 2. Intelligent Notification Management yamlnotification_strategies: immediate_intervention: triggers: - critical_security_threats - active_malware_detection - credential_theft_attempts - financial_fraud_indicators response: - block_content_immediately - generate_detailed_alert - provide_alternative_options - update_threat_database proactive_warning: triggers: - prompt_injection_patterns - suspicious_code_behaviors - privacy_policy_violations - deceptive_ui_patterns response: - display_contextual_warning - explain_specific_risks - offer_mitigation_steps - allow_informed_override advisory_notification: triggers: - minor_security_concerns - outdated_dependencies - suboptimal_privacy_practices - unclear_documentation response: - provide_informational_notice - suggest_best_practices - monitor_for_escalation - log_for_pattern_analysis silent_monitoring: triggers: - low_confidence_detections - legitimate_content_patterns - establi shed_safe_sources - user_override_history response: - continue_background_monitoring - update_behavioral_profiles - prepare_escalation_triggers - maintain_audit_logs ### 3. Adaptive Workflow Configuration yamlworkflow_modes: security_paranoid: description: Maximum security with aggressive threat detection thre sholds: critical: 2.0 high: 3.0 medium: 4.0 low: 6.0 features: - preemptive_blocking - detailed_explanations - alternative_suggestions - learning_mode_active professional_balanced: description: Balanced security for professional environments thre sholds: critical: 4.0 high: 5.0 medium: 6.0 low: 7.5 features: - contextual_warnings - business_risk_focus - efficiency_optimization - compliance_checking research_permissive: description: Permissive mode for security research and analysis thre sholds: critical: 6.0 high: 7.0 medium: 8.0 low: 9.0 features: - educational_notifications - detailed_threat_analysis - research_context_awareness - safe_exploration_tools ## Integration Architecture ### Skill Coordination Framework yamlskill_integrations: content_safety_validator: role: primary_analysis_engine data_flow: bidirectional responsibilities: - comprehensive_threat_detection - risk_assessment_generation - mitigation_recommendation - pattern_database_updates web_content_analyzer: role: real_time_monitoring data_flow: event_driven responsibilities: - live_content_scanning - browser_behavior_analysis - network_activity_monitoring - user_interaction_tracking encoding_pattern_detection: role: specialized_threat_detection data_flow: pattern_match_alerts responsibilities: - encoding_obfuscation_detection - jailbreak_pattern_recognition - instruction_injection_identification - confidence_scoring jailbreak_detection_agent: role: security_response_coordinator data_flow: threat_escalation responsibilities: - immediate_threat_response - user_notification_management - incident_documentation - learning_system_updates ### External Tool Integration yamlexternal_integrations: web_search_coordination: purpose: reputation_verification triggers: - unknown_domain_encountered - suspicious_organization_claims - new_tool_evaluation_requests process: - automated_reputation_search - security_incident_research - alternative_tool_identification - community_review_aggregation web_fetch_analysis: purpose: deep_content_examination triggers: - detailed_analysis_required - source_code_inspection_needed - documentation_verification - terms_of_service_review process: - safe_content_retrieval - automated_analysis_execution - pattern_matching_application - risk_score_calculation ## Decision Making Framework ### Multi-Factor Risk Assessment pythondef calculate_comprehensive_riskanalysis_results: risk_factors = pattern_matches: analysis_results.getpattern_score, 0, behavioral_indicators: analysis_results.getbehavior_score, 0, source_reputation: analysis_results.getreputation_score, 0, user_context: analysis_results.getcontext_score, 0, historical_data: analysis_results.gethistory_score, 0 confidence_weights = multiple_confirmations: 1.0, single_source: 0.8, uncertain_detection: 0.6, conflicting_signals: 0.4 user_preferences = security_level: user.security_preference, false_positive_tolerance: user.fp_tolerance, notification_preference: user.notification_style return synthesize_risk_decisionrisk_factors, confidence_weights, user_preferences ### Contextual Decision Modifiers yamlcontext_modifiers: professional_usage: - increase_privacy_scrutiny - emphasize_compliance_issues - prioritize_reputation_risks - enable_alternative_suggestions personal_usage: - focus_on_personal_safety - highlight_financial_risks - emphasize_privacy_concerns - provide_educational_content research_context: - detailed_threat_explanation - safe_exploration_guidance - academic_source_verification - methodology_transparency development_workflow: - code_security_emphasis - dependency_vulnerability_focus - supply_chain_risk_assessment - development_tool_validation ## User Experience Management ### Progressive Disclosure Strategy yamlnotification_levels: critical_immediate: display: full_blocking_modal content: - threat_type_and_severity - specific_risks_identified - why_content_is_dangerous - alternative_options - educational_resources warning_contextual: display: prominent_warning_banner content: - risk_summary - key_concerns - recommended_precautions - override_option_with_confirmation advisory_subtle: display: discrete_notification_badge content: - brief_concern_summary - optional_detailed_explanation - best_practice_suggestions - click_for_more_info monitoring_silent: display: status_indicator_only content: - security_status_green - audit_log_entry - pattern_learning_update - available_on_demand_details ### Learning and Personalization yamlpersonalization_features: workflow_adaptation: - learn_user_risk_tolerance - adapt_notification_timing - optimize_analysis_depth - customize_explanation_detail pattern_customization: - user_specific_threat_priorities - domain_expertise_recognition - false_positive_pattern_learning - preference_based_filtering efficiency_optimization: - reduce_redundant_analyses - prioritize_relevant_checks - streamline_familiar_workflows - batch_similar_evaluations ## Goal Achievement Strategies ### Primary Objectives 1. Comprehensive Threat Detection - Coordinate multiple analysis engines - Ensure no critical threats are missed - Maintain high detection accuracy - Minimize false positive disruptions 2. Seamless User Experience - Intelligent notification prioritization - Context-appropriate response levels - Educational value in all interactions - Workflow efficiency preservation 3. Continuous Improvement - Learn from user feedback and corrections - Adapt to evolving threat landscapes - Optimize analysis performance - Enhance detection capabilities ### Success Metrics yamlperformance_indicators: detection_effectiveness: - threat_detection_rate: 95% - false_positive_rate: 5% - response_time: 3_seconds - user_satisfaction: 4.5/5 workflow_efficiency: - analysis_completion_time - notification_relevance_score - user_override_frequency - workflow_disruption_minimization learning_effectiveness: - accuracy_improvement_rate - user_preference_adaptation - threat_pattern_evolution_tracking - community_contribution_quality ## Emergency Response Protocols ### Threat Escalation Procedures yamlescalation_matrix: zero_day_threats: - immediate_global_notification - emergency_pattern_distribution - coordinated_community_response - rapid_mitigation_deployment widespread_campaigns: - threat_intelligence_sharing - coordinated_blocking_response - user_education_campaigns - law_enforcement_coordination critical_vulnerabilities: - immediate_user_protection - detailed_technical_analysis - mitigation_strategy_development - vendor_notification_procedures ### System Recovery Protocols yamlrecovery_procedures: false_positive_incidents: - immediate_correction_deployment - affected_user_notification - pattern_database_adjustment - process_improvement_implementation analysis_system_failure: - fallback_to_conservative_blocking - manual_override_procedures - emergency_notification_protocols - rapid_system_restoration This orchestration agent provides comprehensive coordination of all security validation activities while maintaining optimal user experience and continuous system improvement.
Signals
Information
- Repository
- mickdarling/dollhouse-portfolio
- Author
- mickdarling
- Last Sync
- 3/13/2026
- Repo Updated
- 10/25/2025
- Created
- 1/15/2026
Reviews (0)
No reviews yet. Be the first to review this skill!
Related Skills
mem0
Integrate Mem0 Platform into AI applications for persistent memory, personalization, and semantic search. Use this skill when the user mentions "mem0", "memory layer", "remember user preferences", "persistent context", "personalization", or needs to add long-term memory to chatbots, agents, or AI apps. Covers Python and TypeScript SDKs, framework integrations (LangChain, CrewAI, Vercel AI SDK, OpenAI Agents SDK, Pipecat), and the full Platform API. Use even when the user doesn't explicitly say "mem0" but describes needing conversation memory, user context retention, or knowledge retrieval across sessions.
upgrade-nodejs
Upgrading Bun's Self-Reported Node.js Version
cursorrules
CrewAI Development Rules
browser-use
Automates browser interactions for web testing, form filling, screenshots, and data extraction. Use when the user needs to navigate websites, interact with web pages, fill forms, take screenshots, or extract information from web pages.
Related Guides
Bear Notes Claude Skill: Your AI-Powered Note-Taking Assistant
Learn how to use the bear-notes Claude skill. Complete guide with installation instructions and examples.
Mastering tmux with Claude: A Complete Guide to the tmux Claude Skill
Learn how to use the tmux Claude skill. Complete guide with installation instructions and examples.
OpenAI Whisper API Claude Skill: Complete Guide to AI-Powered Audio Transcription
Learn how to use the openai-whisper-api Claude skill. Complete guide with installation instructions and examples.