Overview of red team and bug bounty subagents for offensive security operations and vulnerability research
Simulates advanced threats and discovers vulnerabilities through ethical hacking and penetration testing.
/plugin marketplace add anujkumar001111/xsky-agent/plugin install anujkumar001111-xsky-dev-team@anujkumar001111/xsky-agentRed Team & Bug Bounty subagents are your offensive security specialists, focused on discovering vulnerabilities before malicious actors do. These experts simulate real-world attacks, conduct penetration testing, and hunt for security flaws across web applications, networks, and infrastructure. They operate ethically within defined scopes to improve organizational security posture.
Use these subagents when you need to:
Expert in full-spectrum offensive security operations and adversary emulation. Masters MITRE ATT&CK framework, C2 infrastructure, lateral movement, and persistence mechanisms. Simulates realistic APT campaigns to test organizational defenses.
Use when: Conducting red team engagements, simulating APT attacks, testing incident response, implementing C2 infrastructure, or performing adversary emulation exercises.
Expert in web application security, API testing, and responsible disclosure. Masters OWASP Top 10, business logic flaws, and modern attack vectors. Specializes in finding high-impact vulnerabilities in real-world applications.
Use when: Hunting for web vulnerabilities, testing APIs, participating in bug bounty programs, conducting security assessments, or validating security fixes.
Specialist in comprehensive web application penetration testing. Expert in injection attacks, authentication bypass, session management flaws, and client-side vulnerabilities. Provides detailed findings and remediation guidance.
Use when: Testing web applications, assessing authentication systems, evaluating session management, or conducting comprehensive web security assessments.
Expert in writing secure server-side code and identifying backend vulnerabilities. Masters secure coding practices, input validation, and backend attack prevention. Bridges offensive and defensive security.
Use when: Reviewing backend code security, implementing secure APIs, fixing server-side vulnerabilities, or developing security-hardened services.
Specialist in client-side security and frontend vulnerability prevention. Expert in XSS prevention, CSP implementation, and secure JavaScript practices. Ensures frontend code resists attacks.
Use when: Securing frontend applications, implementing CSP headers, preventing XSS attacks, or reviewing client-side security.
Expert in iOS and Android security testing and secure mobile development. Masters mobile-specific vulnerabilities, API security, and data protection on mobile platforms.
Use when: Testing mobile applications, securing mobile APIs, implementing mobile data protection, or assessing mobile app security.
Master of reconnaissance and information gathering from public sources. Expert in subdomain enumeration, social engineering research, and attack surface mapping. Provides comprehensive target intelligence.
Use when: Conducting reconnaissance, mapping attack surfaces, gathering target intelligence, or performing social engineering research.
| If you need to... | Use this subagent |
|---|---|
| Simulate APT attacks | red-team-operator |
| Hunt web vulnerabilities | bug-bounty-hunter |
| Test web applications | web-app-pentester |
| Secure backend code | backend-security-coder |
| Secure frontend code | frontend-security-coder |
| Test mobile apps | mobile-security-coder |
| Gather intelligence | osint-specialist |
Full Red Team Engagement:
Bug Bounty Campaign:
Security Code Review:
Penetration Testing:
Each subagent comes with:
All red team and bug bounty activities must:
Choose your offensive security specialist and start improving security posture today!
You are an elite AI agent architect specializing in crafting high-performance agent configurations. Your expertise lies in translating user requirements into precisely-tuned agent specifications that maximize effectiveness and reliability.