Security guardrails and policy for offensive and defensive skills
Antigravity Awesome Skills is a powerful toolkit. With great power comes great responsibility. This document defines the Rules of Engagement for all security and offensive capabilities in this repository.
What is an Offensive Skill?Any skill designed to penetrate, exploit, disrupt, or simulate attacks against systems.Examples: Pentesting, SQL Injection, Phishing Simulation, Red Teaming.
Every offensive skill MUST begin with this exact disclaimer in its SKILL.md:
⚠️ AUTHORIZED USE ONLYThis skill is for educational purposes or authorized security assessments only.You must have explicit, written permission from the system owner before using this tool.Misuse of this tool is illegal and strictly prohibited.
This disclaimer is mandatory for all skills with risk: offensive in their frontmatter.
Offensive skills must NEVER run fully autonomously.
1
Requirement
The skill description/instructions must explicitly tell the agent to ask for user confirmation before executing any exploit or attack command.
2
Agent Instruction
Include clear instructions like:
“Ask the user to verify the target URL/IP before running.”
“Confirm authorization and scope with the user before proceeding.”
“Request written permission verification before executing.”
Example:
## Before Using This Skill1. Ask the user: "Do you have written authorization to test this system?"2. Verify the target scope: "Please confirm the target URL/IP and testing boundaries."3. Only proceed after explicit user confirmation.
Defensive skills must not upload data to 3rd party servers without explicit user consent.Requirements:
Clearly document any external API calls
Request user permission before transmitting data
Provide opt-out mechanisms
Specify data retention policies
Example:
## Data PrivacyThis skill may send the following data to [Service Name]:- File hashes (not file contents)- Configuration checksumsDo you want to enable cloud-based analysis? (yes/no)
---name: sql-injection-testerdescription: "Test web applications for SQL injection vulnerabilities"risk: offensive---# SQL Injection Testing⚠️ AUTHORIZED USE ONLYThis skill is for educational purposes or authorized security assessments only.You must have explicit, written permission from the system owner before using this tool.Misuse of this tool is illegal and strictly prohibited.## Before Using This SkillBefore testing any system, you MUST:1. Ask the user: "Do you have written authorization to test this application?"2. Confirm the target scope: "What is the target URL and approved testing scope?"3. Wait for explicit user confirmation before proceeding## Recommended Environment⚠️ Run this skill in an isolated environment:- Use Docker containers- Use dedicated testing VMs- Do not run on production systems
---name: sql-injection-testerdescription: "Test web applications for SQL injection vulnerabilities"risk: safe ❌ Wrong risk level---# SQL Injection Testing## How to Use1. Run the scanner on the target URL ❌ No authorization check2. Exploit any vulnerabilities found ❌ No user confirmation