feat: 30 new variants — deep intel/military + professional specializations
Intel/Military Deep (18 variants):
frodo/pakistan, india, nato-alliance, nuclear, energy-geopolitics, turkey
marshal/russian-doctrine, chinese-doctrine, turkish-doctrine, iranian-military
warden/drone-warfare, naval-warfare, electronic-warfare
centurion/ukraine-russia, ottoman-wars
wraith/case-studies (Ames, Penkovsky, Cambridge Five)
echo/electronic-order-of-battle
ghost/russian-info-war (IRA, GRU cyber, dezinformatsiya)
scribe/cold-war-ops (CIA/KGB ops, VENONA, Gladio)
Professional Specializations (12 variants):
neo/social-engineering, mobile-security
phantom/bug-bounty
specter/firmware
bastion/incident-commander
sentinel/darknet
oracle/crypto-osint
marshal/wargaming
corsair/proxy-warfare
polyglot/swahili
forge/agent-dev
Dynamic config system:
config.yaml — user-specific settings
config.example.yaml — template for new users
build.py — config-aware with {{variable}} injection + conditionals
Total: 108 prompt files, 20,717 lines, 29 personas
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
This commit is contained in:
161
config.example.yaml
Normal file
161
config.example.yaml
Normal file
@@ -0,0 +1,161 @@
|
||||
# Persona Library Configuration
|
||||
# Copy this file to config.yaml and customize for your setup.
|
||||
# Build system reads this file and injects values into persona templates.
|
||||
|
||||
# ─── User Profile ───────────────────────────────────────────────
|
||||
user:
|
||||
name: "Your Name"
|
||||
handle: "your-handle"
|
||||
location: "Country (GMT+X)"
|
||||
role: "Your role/title"
|
||||
languages:
|
||||
native: "en"
|
||||
fluent: ["en"]
|
||||
learning: []
|
||||
communication:
|
||||
style: "direct" # direct | verbose | academic
|
||||
primary_interface: "cli" # cli | telegram | discord | slack
|
||||
casual_language: "en"
|
||||
technical_language: "en"
|
||||
|
||||
# ─── Infrastructure ─────────────────────────────────────────────
|
||||
infrastructure:
|
||||
servers: []
|
||||
# Example:
|
||||
# - name: "production"
|
||||
# ip: "10.0.0.1"
|
||||
# role: "web-server"
|
||||
# os: "debian"
|
||||
# containers: ["nginx", "postgres", "redis"]
|
||||
|
||||
llm:
|
||||
provider: "ollama" # ollama | openai | anthropic | openrouter | custom
|
||||
endpoint: "http://localhost:11434"
|
||||
default_model: "llama3.1"
|
||||
models: []
|
||||
# Example:
|
||||
# - name: "llama3.1"
|
||||
# purpose: "general"
|
||||
# - name: "deepseek-coder"
|
||||
# purpose: "coding"
|
||||
|
||||
tools:
|
||||
# Toggle available tools — personas reference these
|
||||
rss_aggregator: false # FreshRSS, Miniflux, etc.
|
||||
rss_endpoint: ""
|
||||
osint_tools: false # Maigret, theHarvester, etc.
|
||||
osint_endpoint: ""
|
||||
sdr_scanner: false # RTL-SDR, HackRF
|
||||
pcap_analyzer: false # Wireshark/tshark
|
||||
vulnerability_scanner: false # Nuclei, Nessus
|
||||
exploit_framework: false # Metasploit
|
||||
reverse_engineering: false # Ghidra, IDA
|
||||
forensics_tools: false # Volatility, Autopsy
|
||||
c2_framework: false # Cobalt Strike, Sliver
|
||||
threat_intel_platform: false # MISP, OpenCTI
|
||||
threat_intel_endpoint: ""
|
||||
siem: false # Splunk, ELK
|
||||
siem_endpoint: ""
|
||||
docker: false
|
||||
kubernetes: false
|
||||
cloud_provider: "" # aws | gcp | azure | none
|
||||
monitoring: false # Prometheus, Grafana
|
||||
monitoring_endpoint: ""
|
||||
vpn: false # WireGuard, OpenVPN
|
||||
portainer: false
|
||||
portainer_url: ""
|
||||
portainer_api_key: ""
|
||||
syncthing: false
|
||||
git_server: "" # github.com | gitlab.com | self-hosted URL
|
||||
|
||||
# ─── Data Sources ────────────────────────────────────────────────
|
||||
data_sources:
|
||||
knowledge_base: ""
|
||||
# Path to your notes/knowledge base (Obsidian, Logseq, etc.)
|
||||
# Example: "/home/user/Obsidian"
|
||||
|
||||
book_library: ""
|
||||
# Path to PDF/book collection
|
||||
# Example: "/mnt/storage/Books"
|
||||
|
||||
foia_collection: false
|
||||
foia_path: ""
|
||||
foia_file_count: 0
|
||||
|
||||
intel_feeds: false
|
||||
intel_feed_count: 0
|
||||
intel_feed_categories: []
|
||||
|
||||
custom_databases: []
|
||||
# Example:
|
||||
# - name: "Iran Intelligence DB"
|
||||
# path: "/data/iran"
|
||||
# size: "80GB"
|
||||
# description: "JSON feeds + structured analysis"
|
||||
|
||||
# ─── Analytical Frameworks ───────────────────────────────────────
|
||||
frameworks:
|
||||
# Which analytical frameworks to embed in personas
|
||||
uap: false # Universal Analytical Protocol
|
||||
ach: false # Analysis of Competing Hypotheses
|
||||
ach_over_tot: false # ACH layered on Tree-of-Thought
|
||||
pmesii_pt: false # Military analysis matrix
|
||||
dime_fil: false # National power elements
|
||||
ascope: false # Operational environment
|
||||
mitre_attack: true # MITRE ATT&CK (default on for cyber)
|
||||
kill_chain: true # Lockheed Martin Kill Chain
|
||||
diamond_model: false # Diamond Model for CTI
|
||||
disarm: false # Disinformation framework
|
||||
owasp: true # OWASP Top 10
|
||||
|
||||
# Reporting standards
|
||||
ic_confidence: false # IC confidence levels (High/Moderate/Low)
|
||||
multi_source_verification: false # 3-source minimum rule
|
||||
bluf_reporting: false # Bottom Line Up Front
|
||||
output_modes: ["default"] # default | exec_summary | full_report | json | visual
|
||||
|
||||
# ─── Regional Focus ─────────────────────────────────────────────
|
||||
regional_focus:
|
||||
primary: [] # e.g., ["iran", "russia", "china"]
|
||||
secondary: [] # e.g., ["turkey", "africa", "middle-east"]
|
||||
# Personas like Frodo will emphasize these regions
|
||||
|
||||
# ─── Persona Customization ──────────────────────────────────────
|
||||
persona_defaults:
|
||||
language:
|
||||
casual: "en"
|
||||
technical: "en"
|
||||
reports: "en"
|
||||
|
||||
# Hitap style — how personas address the user
|
||||
# Options: formal | military | academic | casual | custom
|
||||
address_style: "formal"
|
||||
|
||||
# Custom address overrides (optional)
|
||||
# custom_addresses:
|
||||
# neo: "Boss"
|
||||
# frodo: "Director"
|
||||
|
||||
# ─── Active Projects (for personalized variants) ────────────────
|
||||
projects: []
|
||||
# Example:
|
||||
# - name: "My Scanner"
|
||||
# stack: "Python, FastAPI"
|
||||
# description: "Automated vulnerability scanner"
|
||||
# status: "production"
|
||||
# - name: "Intel Platform"
|
||||
# stack: "React, Node.js"
|
||||
# description: "Threat intelligence dashboard"
|
||||
# status: "development"
|
||||
|
||||
# ─── Professional Context ───────────────────────────────────────
|
||||
professional:
|
||||
company: ""
|
||||
role: ""
|
||||
certifications: [] # ["OSCP", "CEH", "CISSP"]
|
||||
specializations: [] # ["web-security", "CTI", "IR"]
|
||||
active_engagements: []
|
||||
# Example:
|
||||
# - name: "Client X Pentest"
|
||||
# scope: "external + internal"
|
||||
# domains: 50
|
||||
Reference in New Issue
Block a user