Rank
83
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
Use when the user wants a security audit, penetration test, threat model, vulnerability hunt, security fix plan, SBOM, compliance mapping, privacy assessment, or security posture comparison between runs. --- name: security-analyst description: "Use when the user wants a security audit, penetration test, threat model, vulnerability hunt, security fix plan, SBOM, compliance mapping, privacy assessment, or security posture comparison between runs." --- Security Analyst Offensive security analysis suite that coordinates specialized agents through a multi-group penetration testing pipeline. Finds real vulnerabilities with Capability contract not published. No trust telemetry is available yet. Last updated 4/14/2026.
Freshness
Last checked 4/14/2026
Best For
security-analyst is best for run, read, mcp_task workflows where MCP compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack
Use when the user wants a security audit, penetration test, threat model, vulnerability hunt, security fix plan, SBOM, compliance mapping, privacy assessment, or security posture comparison between runs. --- name: security-analyst description: "Use when the user wants a security audit, penetration test, threat model, vulnerability hunt, security fix plan, SBOM, compliance mapping, privacy assessment, or security posture comparison between runs." --- Security Analyst Offensive security analysis suite that coordinates specialized agents through a multi-group penetration testing pipeline. Finds real vulnerabilities with
Public facts
4
Change events
1
Artifacts
0
Freshness
Apr 14, 2026
Capability contract not published. No trust telemetry is available yet. Last updated 4/14/2026.
Trust score
Unknown
Compatibility
MCP
Freshness
Apr 14, 2026
Vendor
R1ptw0
Artifacts
0
Benchmarks
0
Last release
Unpublished
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Capability contract not published. No trust telemetry is available yet. Last updated 4/14/2026.
Setup snapshot
git clone https://github.com/r1ptw0/security-analyst.gitSetup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
R1ptw0
Protocol compatibility
MCP
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
6
Snippets
0
Languages
typescript
Parameters
text
Recon: Reconnaissance (14 agents, all parallel — 2 waves) └─ Wave A (12 agents, batch-spawned): metadata, docs, HTTP, boundaries, crown jewels, auth, integrations, secrets, security work, config, frontend, deps └─ Wave B (2 agents, batch-spawned): data flows, scope notes (depend on Wave A) └─ Assembly: orchestrator builds recon/index.md from LOD-0+1 returns Surface: Attack Surface + Git History + Dependencies + Config (up to 16 agents, batch-spawned in parallel) ├─ HTTP entry points, authz rules, integrations, frontend ├─ LLM/AI security (OWASP Top 10 for LLM Applications) ├─ API schema validation (OpenAPI, GraphQL, gRPC) ├─ WebSocket / SSE real-time security ├─ File upload security ├─ Injection/auth/SSRF/data-exposure variant hunting via git history ├─ Dependency audit (npm audit, supply chain) ├─ Infrastructure config, secrets, KMS, IAM ├─ CI/CD pipeline security (GitHub Actions, GitLab CI) └─ Container security (Docker, Kubernetes) ┌─ SBOM Assembly (orchestrator, no agent — runs in parallel with logic stage) │ Logic: Business Logic (4 agents batch-spawned, needs surface stage) ├─ Race conditions and TOCTOU ├─ Authorization escalation and IDOR ├─ Pipeline exploitation (input → AI → decision → action) └─ DoS and resource exhaustion Tracing: Data Flow Tracing (up to 4 agents batch-spawned, needs surface + logic) └─ End-to-end trace of critical data flows with sanitization gap analysis Exploits: Exploit Development (1 agent, needs all findings) └─ Develops complete exploits with PoCs, CVSS scores, CWE/ATT&CK IDs, chains Validation: Finding Validation (1 critic agent) └─ Adversarial review — catches false positives, validates fixes, adjusts severity Reporting: Final Report (1 agent) └─ Executive summary, risk dashboard, remediation roadmap Remediation: Fix Plan (1 agent) └─ Actionable tasks with fix code, regression tests, effort estimates
text
/security-analyst:full
text
/security-analyst:focused authentication /security-analyst:focused data processing pipeline /security-analyst:focused frontend /security-analyst:focused database rules /security-analyst:focused AI integration /security-analyst:focused CI/CD /security-analyst:focused containers /security-analyst:focused API /security-analyst:focused real-time /security-analyst:focused file uploads
text
/security-analyst:recon
text
/security-analyst:threat-model
text
/security-analyst:variant-hunt 6dc9bb7 /security-analyst:variant-hunt OData injection /security-analyst:variant-hunt CVE-2024-XXXX
Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB OPENCLEW
Editorial quality
ready
Use when the user wants a security audit, penetration test, threat model, vulnerability hunt, security fix plan, SBOM, compliance mapping, privacy assessment, or security posture comparison between runs. --- name: security-analyst description: "Use when the user wants a security audit, penetration test, threat model, vulnerability hunt, security fix plan, SBOM, compliance mapping, privacy assessment, or security posture comparison between runs." --- Security Analyst Offensive security analysis suite that coordinates specialized agents through a multi-group penetration testing pipeline. Finds real vulnerabilities with
Offensive security analysis suite that coordinates specialized agents through a multi-group penetration testing pipeline. Finds real vulnerabilities with concrete exploits, not checkbox compliance.
| Command | Purpose | Agents | Output |
|---------|---------|--------|--------|
| /security-analyst | Interactive — choose scope and output mode | Varies | Varies |
| /security-analyst:full | All 9 phases, all attack surfaces | 23+ | Full run directory |
| /security-analyst:focused [component] | Target a specific area (e.g., authentication, data pipeline) | 3-6 | Inline findings |
| /security-analyst:recon | Phase 0 only — codebase security map | 14 (parallel) | Recon index + step files |
| /security-analyst:threat-model | Recon + STRIDE analysis + attack trees | 1+ | Threat model doc |
| /security-analyst:variant-hunt [vuln] | Find all unpatched variants of a known vulnerability | 2-6 | Variant findings |
| /security-analyst:fix-plan [run-dir] | Generate implementation plan from existing report | 1 | Fix plan |
| /security-analyst:sbom | Software Bill of Materials — recon + dependency audit only | 15 | SBOM report |
| /security-analyst:diff [run-a] [run-b] | Compare two runs — new, resolved, persistent findings | 1 | Delta report |
| /security-analyst:compliance [framework] | Map findings to SOC 2 / ISO 27001 / PCI DSS / HIPAA / GDPR | 1 | Compliance report |
| /security-analyst:privacy | Privacy assessment — PII flows, consent, data subject rights | 15+ | Privacy report |
Analysis runs in dependency-ordered execution groups. Each group's findings feed the next. Groups are execution-order groupings of phases. Finding IDs use category prefixes (HTTP, INJ, DEP, etc.).
Recon: Reconnaissance (14 agents, all parallel — 2 waves)
└─ Wave A (12 agents, batch-spawned): metadata, docs, HTTP, boundaries, crown jewels, auth, integrations, secrets, security work, config, frontend, deps
└─ Wave B (2 agents, batch-spawned): data flows, scope notes (depend on Wave A)
└─ Assembly: orchestrator builds recon/index.md from LOD-0+1 returns
Surface: Attack Surface + Git History + Dependencies + Config (up to 16 agents, batch-spawned in parallel)
├─ HTTP entry points, authz rules, integrations, frontend
├─ LLM/AI security (OWASP Top 10 for LLM Applications)
├─ API schema validation (OpenAPI, GraphQL, gRPC)
├─ WebSocket / SSE real-time security
├─ File upload security
├─ Injection/auth/SSRF/data-exposure variant hunting via git history
├─ Dependency audit (npm audit, supply chain)
├─ Infrastructure config, secrets, KMS, IAM
├─ CI/CD pipeline security (GitHub Actions, GitLab CI)
└─ Container security (Docker, Kubernetes)
┌─ SBOM Assembly (orchestrator, no agent — runs in parallel with logic stage)
│
Logic: Business Logic (4 agents batch-spawned, needs surface stage)
├─ Race conditions and TOCTOU
├─ Authorization escalation and IDOR
├─ Pipeline exploitation (input → AI → decision → action)
└─ DoS and resource exhaustion
Tracing: Data Flow Tracing (up to 4 agents batch-spawned, needs surface + logic)
└─ End-to-end trace of critical data flows with sanitization gap analysis
Exploits: Exploit Development (1 agent, needs all findings)
└─ Develops complete exploits with PoCs, CVSS scores, CWE/ATT&CK IDs, chains
Validation: Finding Validation (1 critic agent)
└─ Adversarial review — catches false positives, validates fixes, adjusts severity
Reporting: Final Report (1 agent)
└─ Executive summary, risk dashboard, remediation roadmap
Remediation: Fix Plan (1 agent)
└─ Actionable tasks with fix code, regression tests, effort estimates
Every Medium+ finding includes: CVSS 3.1 score, CWE ID, MITRE ATT&CK technique, exploit scoring (exploitability/blast radius/detectability/remediation ROI), attack steps, proof-of-concept, concrete fix code, and regression test.
Full runs write to docs/security/runs/{YYYY-MM-DD-HHMMSS}/:
| File | Content |
|------|---------|
| recon/index.md | Recon LOD-0 + LOD-1 index |
| recon/step-*.md | 14 atomic LOD-2 recon section files |
| findings/ | Atomic LOD-2 finding files + index |
| reports/surface.md | Attack surface, git history, deps, config |
| reports/sbom.md | Software Bill of Materials (deps, licenses, supply chain) |
| reports/logic.md | Business logic exploitation |
| reports/tracing.md | Data flow tracing |
| reports/exploits.md | Exploit catalog with PoCs |
| reports/validation.md | Validated findings |
| reports/final.md | Complete security report |
| reports/fix-plan.md | Implementation plan |
| reports/compliance.md | Compliance mapping (when requested) |
| reports/delta.md | Delta between two runs (when requested) |
| reports/privacy.md | Privacy & data protection assessment (when requested) |
Runs all 9 phases with no prompts. Most thorough — spawns up to 28+ agents across 6 execution groups. Expect significant processing time.
/security-analyst:full
Analyzes a specific component with only relevant agents. Faster (3-6 agents) but still thorough within scope. Findings presented inline — no separate report.
/security-analyst:focused authentication
/security-analyst:focused data processing pipeline
/security-analyst:focused frontend
/security-analyst:focused database rules
/security-analyst:focused AI integration
/security-analyst:focused CI/CD
/security-analyst:focused containers
/security-analyst:focused API
/security-analyst:focused real-time
/security-analyst:focused file uploads
Quick security map without vulnerability analysis. Good for orientation before a full audit or for manual review planning.
/security-analyst:recon
Recon plus STRIDE analysis on each trust boundary, attack trees for each crown jewel, and a risk matrix. Useful for compliance (SOC 2, ISO 27001) and security planning.
/security-analyst:threat-model
Given a known vulnerability (commit hash, CVE, or description), systematically finds all unpatched variants using git history mining and pattern analysis.
/security-analyst:variant-hunt 6dc9bb7
/security-analyst:variant-hunt OData injection
/security-analyst:variant-hunt CVE-2024-XXXX
Generates a compliance-ready SBOM covering all languages, frameworks, direct and transitive dependencies, licenses, and supply chain health indicators. Runs recon plus the dependency audit agent only — no exploitation or attack surface analysis.
/security-analyst:sbom
Compares two security analysis runs to highlight new, resolved, and persistent findings. Tracks dependency changes, attack surface evolution, and fix plan progress. Auto-detects the two most recent runs or accepts specific run directories.
/security-analyst:diff
/security-analyst:diff docs/security/runs/2025-06-01-100000 docs/security/runs/2025-06-15-143022
Maps findings from an existing security run to a compliance framework. Assesses each control as Pass/Partial/Fail/N/A and produces a compliance score with gap analysis.
/security-analyst:compliance soc2
/security-analyst:compliance iso27001
/security-analyst:compliance pci-dss
/security-analyst:compliance hipaa
/security-analyst:compliance gdpr
Traces all PII data flows, evaluates consent mechanisms, checks data subject rights implementation (access, erasure, portability), reviews data retention and deletion, and assesses cross-border transfers. Can run standalone or enrich an existing security run.
/security-analyst:privacy
Generates an implementation plan from an existing security report. Auto-detects the latest run or accepts a specific run directory. Tasks are prioritized: Quick Wins, Immediate, Short-term, Medium-term, Backlog.
/security-analyst:fix-plan
/security-analyst:fix-plan docs/security/runs/2025-06-15-143022
For detailed architecture reference (directory structure, agent design, LOD architecture, customization), see references/architecture.md. For all constants (paths, filenames, agent registry, placeholders), see references/constants.md.
Key concepts:
Copy or symlink this skill folder to your skills directory:
# Claude Code
cp -r . ~/.claude/skills/security-analyst
# Cursor
cp -r . ~/.cursor/skills/security-analyst
Skill doesn't trigger on security-related requests
MCP or subagent connection fails during analysis
Findings seem generic or lack concrete exploits
/security-analyst:focused authentication) for deeper analysisMachine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/r1ptw0-security-analyst/snapshot"
curl -s "https://xpersona.co/api/v1/agents/r1ptw0-security-analyst/contract"
curl -s "https://xpersona.co/api/v1/agents/r1ptw0-security-analyst/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
83
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Rank
80
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Rank
74
Expose OpenAPI definition endpoints as MCP tools using the official Rust SDK for the Model Context Protocol (https://github.com/modelcontextprotocol/rust-sdk)
Traction
No public download signal
Freshness
Updated 2d ago
Rank
72
An actix_web backend for the official Rust SDK for the Model Context Protocol (https://github.com/modelcontextprotocol/rust-sdk)
Traction
No public download signal
Freshness
Updated 2d ago
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/r1ptw0-security-analyst/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/r1ptw0-security-analyst/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/r1ptw0-security-analyst/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/r1ptw0-security-analyst/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/r1ptw0-security-analyst/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/r1ptw0-security-analyst/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"MCP"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_OPENCLEW",
"generatedAt": "2026-04-16T23:35:13.079Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "MCP",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
},
{
"key": "run",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "read",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "mcp_task",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:MCP|unknown|profile capability:run|supported|profile capability:read|supported|profile capability:mcp_task|supported|profile"
}Facts JSON
[
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "R1ptw0",
"href": "https://github.com/r1ptw0/security-analyst",
"sourceUrl": "https://github.com/r1ptw0/security-analyst",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-04-14T22:26:08.496Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "MCP",
"href": "https://xpersona.co/api/v1/agents/r1ptw0-security-analyst/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/r1ptw0-security-analyst/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-04-14T22:26:08.496Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/r1ptw0-security-analyst/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/r1ptw0-security-analyst/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub · GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to security-analyst and adjacent AI workflows.