Use when starting a security assessment to map architecture, entry points, and attack surface (Phase 1 & 2)
From perseusnpx claudepluginhub kaivyy/perseus --plugin perseusThis skill uses the workspace's default tool permissions.
Designs and optimizes AI agent action spaces, tool definitions, observation formats, error recovery, and context for higher task completion rates.
Enables AI agents to execute x402 payments with per-task budgets, spending controls, and non-custodial wallets via MCP tools. Use when agents pay for APIs, services, or other agents.
Compares coding agents like Claude Code and Aider on custom YAML-defined codebase tasks using git worktrees, measuring pass rate, cost, time, and consistency.
This skill executes the Pre-Reconnaissance Methodology of the Perseus framework. It maps the target's digital footprint, internal architecture, and attack surface to build a "Target Knowledge Graph".
Goal: Zero-blind-spot understanding of what exists, how it works, and where it can be attacked.
Methodology:
For large codebases, use incremental scanning to only analyze changed files:
Detection: Check for perseus.yaml with incremental settings:
incremental:
enabled: true
baseline: "main" # or specific commit
If incremental enabled:
git diff --name-only <baseline>...HEAD to get changed files.perseus-cache/Incremental Workflow:
# Get changed files
git diff --name-only main...HEAD | grep -E '\.(js|ts|py|go|php|rb|java|rs|cs)$'
# If no changes, skip scan
# If changes exist, scan only those files + imports
Launch these 3 agents simultaneously using a single message with multiple Task tool calls:
Wait for Phase 1 to complete. Then launch these 3 agents simultaneously:
innerHTML, exec, system, eval, SQL queries, file operations. Provide File:Line references."fetch, axios), URL fetchers, webhooks. Map user-controllable parameters."Synthesize all findings into deliverables/code_analysis_deliverable.md.
Required Report Structure:
Schema Collection:
outputs/schemas/ directory.Next Step: Proceed to perseus:audit to analyze identified components for vulnerabilities.