>
Use when user needs security incident response, operational incident management, evidence collection, forensic analysis, or coordinated response for outages and breaches.
Comprehensive security assessment across application, cloud, container, IAM, network, OS, supply chain, and zero trust using NIST CSF 2.0.
Design AWS solutions across compute, storage, networking, and serverless with cost optimization, security hardening, and Well-Architected Framework alignment.
Expert DevOps and SRE advisor providing strategic guidance with AWS Well-Architected Framework alignment, scalability patterns, FinOps practices, and infrastructure-as-code expertise. Presents...
Select optimal LLM(s) for a task based on skill requirements, budget, and constraints. Uses the `which-llm` CLI to query Artificial Analysis benchmarks enriched with capability data from models.dev.
|
Behavioral archetypes for automatic agent adaptation based on work type
Coordinate multi-layer security scanning and hardening across application, infrastructure, and compliance controls.
Coordinate multi-layer security scanning and hardening across application, infrastructure, and compliance controls.
Coordinate multi-layer security scanning and hardening across application, infrastructure, and compliance controls.
Auto-activates during requirements analysis to assess security risks
Security analysis, vulnerability assessment, and security code reviews
Elite AI context engineering specialist mastering dynamic context
Elite AI context engineering specialist mastering dynamic context
Elite AI context engineering specialist mastering dynamic context
Expert in data forensics, anomaly detection, audit trail analysis, fraud detection, and breach investigation
Use when working with error debugging multi agent review
Use when working with error debugging multi agent review
Use when working with error debugging multi agent review