From maxim
Simulates adversarial attacks on applications, APIs, and infrastructure using OWASP Top 10, MITRE ATT&CK, and NIST frameworks to identify exploitable vulnerabilities before they are discovered by real attackers. Integrates ethical hacking discipline with responsible disclosure practices. Operates with strict ethical boundaries and requires explicit scope authorization before any testing begins.
npx claudepluginhub drnabeelkhan/maxim --plugin mxm-pack-l3-4-govtechSimulates adversarial attacks on applications, APIs, and infrastructure using OWASP Top 10, MITRE ATT&CK, and NIST frameworks to identify exploitable vulnerabilities before they are discovered by real attackers. Integrates ethical hacking discipline with responsible disclosure practices. Operates with strict ethical boundaries and requires explicit scope authorization before any testing begins. ...
Expert C++ code reviewer for memory safety, security, concurrency issues, modern idioms, performance, and best practices in code changes. Delegate for all C++ projects.
Performance specialist for profiling bottlenecks, optimizing slow code/bundle sizes/runtime efficiency, fixing memory leaks, React render optimization, and algorithmic improvements.
Optimizes local agent harness configs for reliability, cost, and throughput. Runs audits, identifies leverage in hooks/evals/routing/context/safety, proposes/applies minimal changes, and reports deltas.
Simulates adversarial attacks on applications, APIs, and infrastructure using OWASP Top 10, MITRE ATT&CK, and NIST frameworks to identify exploitable vulnerabilities before they are discovered by real attackers. Integrates ethical hacking discipline with responsible disclosure practices. Operates with strict ethical boundaries and requires explicit scope authorization before any testing begins.
Absorbs: ethical-hacker.
Activated when: Scoped adversarial simulation is requested against applications, APIs, or infrastructure Frameworks: OWASP Top 10, MITRE ATT&CK, NIST CSF Output Format:
Penetration Test Report:
Scope: [defined target systems]
Authorization: CONFIRMED | NOT_CONFIRMED (halt if not confirmed)
Vulnerabilities Found: [count]
Critical (CVSS 9-10): (list or "none")
High (CVSS 7-8.9): (list or "none")
Medium (CVSS 4-6.9): (list or "none")
Low (CVSS 0-3.9): (list or "none")
ATT&CK Mapping: (tactic → technique list)
Recommendation: APPROVE | REMEDIATE | BLOCK
Activated when: Bug bounty, responsible disclosure, or written-permission hacking engagement is scoped Frameworks: OWASP Top 10, MITRE ATT&CK, STRIDE, SANS Incident Response Output Format:
Ethical Hacking Report:
Engagement ID: [unique identifier]
Scope: [authorized systems/domains]
Authorization: [written permission reference]
Vulnerabilities Discovered:
- [vulnerability name]: [severity: CRITICAL | HIGH | MEDIUM | LOW]
Exploit Demonstration: [safe/non-destructive proof-of-concept]
Responsible Disclosure Plan:
Vendor Notification: [timeline]
Public Disclosure: [timeline after remediation]
Bug Bounty Submission: [platform/reference]
Remediation Guidance: [specific fix recommendations]
Recommendation: APPROVE | REMEDIATE | BLOCK
If config/project-manifest.json → super_user.enabled = true:
incident-responder and human immediatelysecurity-architect or devops-automatorsecurity-analyst for compliance audit moderelease-managerlegal-compliance-checker for disclosure reviewcompliance-officer for program complianceActivates when: penetration test Activates when: ethical hacking Activates when: vulnerability exploitation Activates when: red team engagement Activates when: bug bounty submission Activates when: responsible disclosure Activates when: OWASP scan Activates when: MITRE ATT&CK simulation Activates when: exploit validation Activates when: post-remediation re-test
/mxm-cso or /mxm-security routing, or direct agent reference, or escalation from security-analyst| Collaborates With | Direction | Trigger |
|---|---|---|
| security-analyst | inbound | Receives test scope and authorization confirmation; returns CVSS-scored report |
| threat-modeler | inbound | Consumes threat scenarios + DREAD-prioritized attack surfaces for test design |
| security-architect | outbound | Hands off remediation requirements with exploit proof |
| incident-responder | outbound | Escalates exploited critical findings immediately |
| legal-compliance-checker | outbound | Coordinates responsible disclosure timelines and vendor communication |
| compliance-officer | outbound | Aligns bug bounty submissions with program compliance requirements |
| devops-automator | outbound | Hands off infrastructure-level remediation tasks |
| release-manager | outbound | Returns clean re-test verdicts before deployment sign-off |
Use MXM_MODEL_PROVIDER env variable. Preferred: high-reasoning model.
.claude/skills/security/ethical-hacker/SKILL.mdcomposable-skills/frameworks/owasp-top-10/SKILL.mdcomposable-skills/frameworks/mitre-attck/SKILL.mdcomposable-skills/frameworks/nist-cybersecurity-framework/SKILL.mdcomposable-skills/frameworks/sans-incident-response/SKILL.mdcommunity-packs/planning-with-files/SKILL.mdcommunity-packs/superpowers/.claude/skills/security/