Agents
Security Auditor
Security audits, compliance assessments, and risk evaluations
- Mode:
subagent - Quality: 4.25/5 (Good)
- Tags: security-audit, compliance, risk, vulnerabilities, assessment
Penetration Tester
Offensive security testing, vulnerability exploitation, and risk demos
- Mode:
subagent - Quality: 4.62/5 (Excellent)
- Tags: penetration-testing, security, exploitation, vulnerabilities, offensive
Security Engineer
Threat modeling, secure SDLC, vulnerability management, and security architecture
- Mode:
subagent - Quality: 4.25/5 (Good)
- Tags: security, threat-modeling, sdlc, vulnerability-management, devsecops
Compliance Auditor
Compliance framework specialist for SOC2, GDPR, HIPAA, PCI-DSS, and ISO 27001
- Mode:
subagent - Quality: 4.75/5 (Excellent)
- Tags: compliance, soc2, gdpr, hipaa, pci-dss, iso-27001, audit
Smart Contract Auditor
Smart contract security audits, vulnerability detection, and attack analysis
- Mode:
subagent - Quality: 4.75/5 (Excellent)
- Tags: smart-contracts, blockchain, solidity, security, web3, audit
Usage Examples
Quality Stats
- Average score: 4.52/5
- 3 Excellent, 2 Good rating
- Total tokens: ~8,600 (avg ~1,720 per agent)
- Coverage: Offensive + defensive + compliance + blockchain
Common Workflows
Security Team Pack
Security Team Pack
Comprehensive security coverage:Includes: security-auditor, penetration-tester, smart-contract-auditor, compliance-auditor
Ship It Safely
Ship It Safely
Security + DevOps + testing:Includes: ci-cd-engineer, docker-specialist, kubernetes-specialist, sre-engineer, security-engineer, qa-expert
Security Review Process
Security Review Process
- Security Engineer — Threat modeling and architecture review
- Security Auditor — Code and configuration audit
- Penetration Tester — Offensive testing
- Compliance Auditor — Compliance validation (if needed)
Smart Contract Security
Smart Contract Security
- Smart Contract Auditor — Full contract audit
- Security Engineer — Threat modeling for contract interactions
- Penetration Tester — Exploit scenario testing
When to Use
Choose Security Auditor when...
Choose Security Auditor when...
- Conducting security assessments
- Reviewing code for vulnerabilities
- Evaluating security posture
- Preparing for security certifications
Choose Penetration Tester when...
Choose Penetration Tester when...
- Testing application security
- Finding exploitable vulnerabilities
- Validating security controls
- Demonstrating risk to stakeholders
Choose Security Engineer when...
Choose Security Engineer when...
- Designing secure systems
- Implementing threat modeling
- Building security into SDLC
- Vulnerability management
Choose Compliance Auditor when...
Choose Compliance Auditor when...
- Preparing for SOC2, GDPR, HIPAA, PCI-DSS, ISO 27001
- Conducting compliance gap analysis
- Implementing compliance controls
- Maintaining certification readiness
Choose Smart Contract Auditor when...
Choose Smart Contract Auditor when...
- Auditing Solidity contracts
- Reviewing DeFi protocols
- Detecting reentrancy, overflow, access control issues
- Pre-deployment security validation
Security Best Practices
All security agents follow responsible disclosure practices. Use offensive security tools (like penetration testing) only on systems you own or have explicit permission to test.
Defense in Depth
Use multiple agents for comprehensive coverage:
- Security Engineer for architecture
- Security Auditor for code review
- Penetration Tester for validation
Shift Left Security
Integrate security early:
- Security Engineer during design
- Code Reviewer in PRs (with security focus)
- Security Auditor before deployment