Understanding Personas
Personas are expert methodologies extracted from RAPTORโs Python code and made accessible for explicit invocation. They load on-demand (0 tokens until requested) and provide specialized analysis frameworks.Available Personas
RAPTOR includes nine built-in expert personas:| Persona | Expert | Purpose | Token Cost |
|---|---|---|---|
| Exploit Developer | Mark Dowd | Generate working PoCs | ~650t |
| Crash Analyst | Charlie Miller / Halvar Flake | Binary crash analysis | ~700t |
| Security Researcher | Research methodology | Vulnerability validation | ~620t |
| Patch Engineer | Senior security engineer | Secure patch creation | ~400t |
| Penetration Tester | Senior pentester | Web payload generation | ~350t |
| Fuzzing Strategist | Expert strategist | Fuzzing decisions | ~300t |
| Binary Exploitation Specialist | Binary expert | Crash exploit generation | ~400t |
| CodeQL Dataflow Analyst | Dataflow expert | Dataflow validation | ~400t |
| CodeQL Finding Analyst | Mark Dowd methodology | CodeQL findings | ~350t |
How Personas Work
Persona Structure
A persona file follows this standard format:Creating a Custom Persona
Follow these steps to create a new persona:Step 1: Define Expertise Domain
Identify the specialized domain:Good Persona Domains
Good Persona Domains
- API security analysis
- Cloud configuration auditing
- Cryptographic implementation review
- Container security assessment
- Authentication mechanism analysis
- Database security configuration
Poor Persona Domains (Too Broad)
Poor Persona Domains (Too Broad)
- โGeneral securityโ (use Security Researcher instead)
- โCode reviewโ (too generic)
- โTestingโ (not specific enough)
Step 2: Develop Methodology
Create a systematic approach with clear steps:Step 3: Create Persona File
Create a new file intiers/personas/:
Step 4: Write Persona Content
Use this template:Usage
Invoke explicitly:- Load this persona (XXX tokens)
- Apply [methodology name]
- Return structured analysis
Usage
Invoke explicitly:- Load this persona (450 tokens)
- Apply 4-step framework (auth, authz, rate limit, validation)
- Return structured analysis with severity
Include Real Examples
Secure Code
Update Regularly
- New attack techniques: Add to methodology
- False positives: Refine decision criteria
- User feedback: Incorporate lessons learned
- Tool evolution: Update references
Sharing Personas
Share personas with your team:- Commit to repository:
tiers/personas/team/ - Document in README: Update persona list
- Provide examples: Include usage examples
- Train team: Show how to invoke
Summary
Creating custom personas:- Identify specialized domain
- Develop systematic methodology
- Create persona file in
tiers/personas/ - Test with real analysis
- Refine based on results
- Share with team
Next Steps
Claude Code Usage
Learn how to invoke personas interactively
Extending RAPTOR
Add custom scanners and agents
Python CLI
Use RAPTOR from command line
Existing Personas
Reference for built-in personas