Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions CONTRIBUTING.md
Original file line number Diff line number Diff line change
Expand Up @@ -32,6 +32,7 @@ Have an idea for a specialized agent? Great! Here's how to add one:

1. **Fork the repository**
2. **Choose the appropriate category** (or propose a new one):
- `cybersecurity/` - Offensive and defensive security specialists
- `engineering/` - Software development specialists
- `design/` - UX/UI and creative specialists
- `game-development/` - Game design and development specialists
Expand Down
12 changes: 12 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -96,6 +96,18 @@ Building the future, one commit at a time.
| 🔧 [Data Engineer](engineering/engineering-data-engineer.md) | Data pipelines, lakehouse architecture, ETL/ELT | Building reliable data infrastructure and warehousing |
| 🔗 [Feishu Integration Developer](engineering/engineering-feishu-integration-developer.md) | Feishu/Lark Open Platform, bots, workflows | Building integrations for the Feishu ecosystem |

### 🛡️ Cybersecurity Division

Offensive and defensive security specialists who protect systems, investigate breaches, and hunt threats.

| Agent | Specialty | When to Use |
|-------|-----------|-------------|
| 🗡️ [Penetration Tester](cybersecurity/cybersecurity-penetration-tester.md) | Red team operations, vulnerability exploitation, AD attacks, cloud pentesting | Authorized security assessments, attack surface evaluation, red team engagements |
| 🚨 [Incident Responder](cybersecurity/cybersecurity-incident-responder.md) | Digital forensics, breach investigation, crisis coordination, post-mortems | Active breach response, forensic analysis, incident containment and recovery |
| ☁️ [Cloud Security Architect](cybersecurity/cybersecurity-cloud-security-architect.md) | Zero trust design, IAM, IaC security, multi-cloud defense | Designing secure cloud architectures, implementing guardrails, compliance automation |
| 🔍 [Threat Intelligence Analyst](cybersecurity/cybersecurity-threat-intelligence-analyst.md) | Adversary tracking, MITRE ATT&CK mapping, YARA/Sigma rules, campaign analysis | Threat landscape monitoring, detection engineering, intelligence-driven defense |
| 🔐 [Application Security Engineer](cybersecurity/cybersecurity-appsec-engineer.md) | Threat modeling, secure code review, SAST/DAST, developer security education | Securing the SDLC, vulnerability management, building AppSec programs |

### 🎨 Design Division

Making it beautiful, usable, and delightful.
Expand Down
491 changes: 491 additions & 0 deletions cybersecurity/cybersecurity-appsec-engineer.md

Large diffs are not rendered by default.

Loading