npx claudepluginhub plurigrid/asi --plugin asiThis skill uses the workspace's default tool permissions.
- When deploying or configuring implementing security chaos engineering capabilities in your environment
Implements AWS security chaos experiments with boto3 to disable controls like firewalls, logs, EDR and verify SOC detection. For testing resilience in lab environments.
Implements security chaos engineering experiments using boto3 and subprocess to disrupt AWS controls like WAF bypass, firewall deletions, CloudTrail disable, and EDR tests. Verifies SOC detection coverage and resilience.
Performs purple team exercises coordinating red team adversary emulation with blue team detection validation using MITRE ATT&CK scenarios for SOC detection testing and gap remediation.
Share bugs, ideas, or general feedback.
Design and execute security chaos experiments that intentionally break security controls to verify that detection, alerting, and response systems work correctly.
# Example: Verify detection when a security group is opened
import boto3
ec2 = boto3.client("ec2")
# Chaos experiment: temporarily add 0.0.0.0/0 rule
ec2.authorize_security_group_ingress(
GroupId="sg-12345",
IpProtocol="tcp", FromPort=22, ToPort=22,
CidrIp="0.0.0.0/0",
)
# Verify: does GuardDuty/Config alert fire within SLA?
# Rollback: remove the rule after verification
Key experiments:
# Rollback function for safe experiment execution
def run_experiment(setup_fn, verify_fn, rollback_fn, timeout=300):
try:
setup_fn()
result = verify_fn(timeout)
finally:
rollback_fn()
return result