Agent Architecture
The agent system follows these principles:- Specialization: Each agent focuses on a specific domain (crash analysis, OSS forensics, exploitability validation)
- Orchestration: Agents can invoke other agents to complete subtasks
- Evidence-Based: Agents produce verifiable artifacts and maintain audit trails
- Autonomous: Agents make decisions within their domain without constant human intervention
Available Agents
Security Testing Agents
OffSec Specialist
Offensive security operations, penetration testing, and vulnerability research
Exploitability Validator
Multi-stage pipeline to validate vulnerability findings are real and exploitable
Crash Analysis Agents
Crash Analysis System
Autonomous root-cause analysis for C/C++ crashes using rr, traces, and coverage
Function Trace Generator
Generate function-level execution traces for debugging
Coverage Analyzer
Generate gcov coverage data for code analysis
OSS Forensics Agents
OSS Forensics System
Evidence-backed forensic investigation for GitHub repositories
Agent Communication
Agents communicate through:- Working Directories: Shared workspace for artifacts (
.out/[task]-[timestamp]/) - Evidence Stores: JSON-based evidence collection with verification metadata
- Return Messages: Structured status reports to orchestrators
- File Artifacts: Markdown reports, JSON data, trace files
Orchestration Patterns
Sequential Pipeline
Agents execute in sequence, each building on previous results:Parallel Collection
Multiple specialist agents collect evidence simultaneously:Iterative Refinement
Agent work is validated and refined through feedback loops:Working Directory Structure
Each agent task creates a timestamped working directory:Agent Implementation
All agents are defined in~/workspace/source/.claude/agents/ with:
- Frontmatter: Name, description, tools, model configuration
- Instructions: Detailed workflow and execution steps
- Error Handling: Recovery procedures for common failures
- Output Specifications: Required artifact formats
Next Steps
OffSec Specialist
Learn about offensive security testing capabilities
Crash Analysis
Explore autonomous crash root-cause analysis
OSS Forensics
Investigate GitHub security incidents
Expert Personas
View specialized expert methodologies