Use when you have a written implementation plan to execute in a separate session with review checkpoints
npx skills add grahama1970/agent-skills --skill "hack"
Install specific skill from multi-skill repository
# Description
>
# SKILL.md
name: hack
description: >
Containerized security auditing and ethical hacking tools.
All operations run in isolated Docker containers for safety.
allowed-tools:
- run_command
- read_file
triggers:
- hack
- scan
- audit
- security check
- red team
- blue team
metadata:
short-description: Containerized security auditing and ethical hacking
requires: docker
Hack Skill
Containerized security auditing and ethical hacking tools.
All security operations run in isolated Docker containers - no tools execute on the host system. This ensures:
- Isolation from host filesystem and network
- Reproducible scanning environment
- No risk of tool vulnerabilities affecting host
- Safe execution of untrusted exploit code
Prerequisites
- Docker Engine must be installed and running
- The security container image will be built automatically on first use
Commands
Network Scanning
# Basic port scan
./run.sh scan 192.168.1.1
# Service detection scan
./run.sh scan 192.168.1.1 --scan-type service
# Vulnerability scripts
./run.sh scan 192.168.1.1 --scan-type vuln --ports 22,80,443
# Save results
./run.sh scan 192.168.1.1 --output scan_results.txt
Static Application Security Testing (SAST)
# Full audit (Semgrep + Bandit)
./run.sh audit /path/to/code
# Semgrep only
./run.sh audit /path/to/code --tool semgrep
# Bandit only (Python)
./run.sh audit /path/to/code --tool bandit
# Filter by severity
./run.sh audit /path/to/code --severity high
Software Composition Analysis (SCA)
# Check Python dependencies for vulnerabilities
./run.sh sca /path/to/project
# Use safety instead of pip-audit
./run.sh sca /path/to/project --tool safety
Check Available Tools
./run.sh tools
Isolated Exploit Execution
# Run Python exploit in isolated container
./run.sh exploit --target 192.168.1.50 --env python --payload exploit.py
# Interactive shell in isolated environment
./run.sh exploit --target 192.168.1.50 --env kali --interactive
Knowledge Base & Research
# Fetch exploits from Exploit-DB
./run.sh learn --source exploit-db
# Search GitHub for CVE PoCs
./run.sh learn --source github --query "CVE-2024-1234"
# Deep research via dogpile
./run.sh research "buffer overflow mitigation techniques"
Architecture
+-------------------+ +------------------------+
| Host System | | Docker Container |
| | | (hack-skill-security) |
| ./run.sh scan ... | --> | nmap, semgrep, bandit |
| | | pip-audit, safety |
| (No tools here) | | |
+-------------------+ +------------------------+
| |
+--- Results returned -----+
Red Team / Blue Team Usage
Red Team (Attack)
scan- Discover open ports and servicesaudit- Find vulnerabilities in target codeexploit- Execute PoC in isolated environmentlearn --source github- Find CVE exploitsprove --negate- Find counterexamples to security claims
Blue Team (Defense)
audit- Find vulnerabilities before attackerssca- Identify vulnerable dependenciesprove- Formally verify security propertiesresearch- Study attack techniques to defend against
Memory Integration
The hack skill is deeply integrated with the memory skill - the brain of the entire project.
Automatic Memory Recall
All scanning and audit commands automatically query memory for relevant prior knowledge before execution:
- Previous scanning techniques that worked
- Known vulnerabilities and their mitigations
- Exploit patterns and defenses
# Scan with memory recall (enabled by default)
./run.sh scan 192.168.1.1
# Disable memory recall for faster scans
./run.sh scan 192.168.1.1 --no-recall
Explicit Memory Commands
# Store security knowledge
./run.sh remember "Use nmap -sV for service detection" --title "nmap tips"
./run.sh remember "CVE-2024-1234 affects version 1.0-1.5" --tags "cve,critical"
# Recall knowledge
./run.sh recall "nmap scanning techniques"
./run.sh recall "buffer overflow exploits" --k 10
Knowledge Flow
+----------------+ +---------------+ +------------------+
| hack skill | --> | memory skill | --> | Future Sessions |
| | | | | |
| - scan results | | - Store | | - recall before |
| - audit finds | | - Embed | | operations |
| - exploits | | - Index | | - learn from |
| | | | | past attempts |
+----------------+ +---------------+ +------------------+
Leveraged Skills
The hack skill delegates to sibling skills rather than duplicating functionality:
Core Integrations (Direct Commands)
| Skill | Command | Purpose |
|---|---|---|
memory |
(automatic) | Recall prior exploits/solutions before every operation |
anvil |
hack harden |
Thunderdome multi-agent red teaming |
docker-ops |
hack docker-cleanup |
Container pruning and management |
treesitter |
hack symbols |
Parse code structure before auditing |
taxonomy |
hack classify |
Tag findings with bridge tags (Loyalty, Fragility, etc.) |
task-monitor |
(automatic) | Track long-running scan progress |
Research Integrations (via hack research)
| Skill | Usage |
|---|---|
dogpile |
Deep multi-source research |
arxiv |
Academic security papers |
perplexity |
Real-time threat intelligence |
lean4-prove |
Formal security verification |
learn |
Knowledge extraction & storage |
Skill Delegation Examples
# Red-team a codebase via anvil Thunderdome
./run.sh harden /path/to/code --issue "SQL injection in auth"
# Clean up Docker via docker-ops
./run.sh docker-cleanup --until 24h --execute
# Extract code symbols via treesitter before audit
./run.sh symbols /path/to/file.py --content
# Classify findings via taxonomy for graph storage
./run.sh classify "SQL injection vulnerability in login handler"
Safety Notes
- Authorized Use Only - Only use against systems you have permission to test
- Isolated Execution - All tools run in Docker containers
- Network Isolation - SAST audits run with
--network=none - Read-Only Mounts - Target directories mounted read-only
Example Workflows
Vulnerability Assessment
# 1. Scan network
./run.sh scan 192.168.1.0/24 --scan-type basic
# 2. Audit discovered services
./run.sh audit /path/to/webapp --severity medium
# 3. Check dependencies
./run.sh sca /path/to/webapp
Exploit Development
# 1. Research the vulnerability
./run.sh learn --source github --query "CVE-2024-XXXX"
# 2. Test exploit in isolation
./run.sh exploit --target test-vm --env python --payload poc.py
# 3. Verify fix with formal methods
./run.sh prove --claim "buffer overflow impossible after patch"
# Supported AI Coding Agents
This skill is compatible with the SKILL.md standard and works with all major AI coding agents:
Learn more about the SKILL.md standard and how to use these skills with your preferred AI coding agent.