# Persona Library Configuration # Copy this file to config.yaml and customize for your setup. # Build system reads this file and injects values into persona templates. # ─── User Profile ─────────────────────────────────────────────── user: name: "Your Name" handle: "your-handle" location: "Country (GMT+X)" role: "Your role/title" languages: native: "en" fluent: ["en"] learning: [] communication: style: "direct" # direct | verbose | academic primary_interface: "cli" # cli | telegram | discord | slack casual_language: "en" technical_language: "en" # ─── Infrastructure ───────────────────────────────────────────── infrastructure: servers: [] # Example: # - name: "production" # ip: "10.0.0.1" # role: "web-server" # os: "debian" # containers: ["nginx", "postgres", "redis"] llm: provider: "ollama" # ollama | openai | anthropic | openrouter | custom endpoint: "http://localhost:11434" default_model: "llama3.1" models: [] # Example: # - name: "llama3.1" # purpose: "general" # - name: "deepseek-coder" # purpose: "coding" tools: # Toggle available tools — personas reference these rss_aggregator: false # FreshRSS, Miniflux, etc. rss_endpoint: "" osint_tools: false # Maigret, theHarvester, etc. osint_endpoint: "" sdr_scanner: false # RTL-SDR, HackRF pcap_analyzer: false # Wireshark/tshark vulnerability_scanner: false # Nuclei, Nessus exploit_framework: false # Metasploit reverse_engineering: false # Ghidra, IDA forensics_tools: false # Volatility, Autopsy c2_framework: false # Cobalt Strike, Sliver threat_intel_platform: false # MISP, OpenCTI threat_intel_endpoint: "" siem: false # Splunk, ELK siem_endpoint: "" docker: false kubernetes: false cloud_provider: "" # aws | gcp | azure | none monitoring: false # Prometheus, Grafana monitoring_endpoint: "" vpn: false # WireGuard, OpenVPN portainer: false portainer_url: "" portainer_api_key: "" syncthing: false git_server: "" # github.com | gitlab.com | self-hosted URL # ─── Data Sources ──────────────────────────────────────────────── data_sources: knowledge_base: "" # Path to your notes/knowledge base (Obsidian, Logseq, etc.) # Example: "/home/user/Obsidian" book_library: "" # Path to PDF/book collection # Example: "/mnt/storage/Books" foia_collection: false foia_path: "" foia_file_count: 0 intel_feeds: false intel_feed_count: 0 intel_feed_categories: [] custom_databases: [] # Example: # - name: "Iran Intelligence DB" # path: "/data/iran" # size: "80GB" # description: "JSON feeds + structured analysis" # ─── Analytical Frameworks ─────────────────────────────────────── frameworks: # Which analytical frameworks to embed in personas uap: false # Universal Analytical Protocol ach: false # Analysis of Competing Hypotheses ach_over_tot: false # ACH layered on Tree-of-Thought pmesii_pt: false # Military analysis matrix dime_fil: false # National power elements ascope: false # Operational environment mitre_attack: true # MITRE ATT&CK (default on for cyber) kill_chain: true # Lockheed Martin Kill Chain diamond_model: false # Diamond Model for CTI disarm: false # Disinformation framework owasp: true # OWASP Top 10 # Reporting standards ic_confidence: false # IC confidence levels (High/Moderate/Low) multi_source_verification: false # 3-source minimum rule bluf_reporting: false # Bottom Line Up Front output_modes: ["default"] # default | exec_summary | full_report | json | visual # ─── Regional Focus ───────────────────────────────────────────── regional_focus: primary: [] # e.g., ["iran", "russia", "china"] secondary: [] # e.g., ["turkey", "africa", "middle-east"] # Personas like Frodo will emphasize these regions # ─── Persona Customization ────────────────────────────────────── persona_defaults: language: casual: "en" technical: "en" reports: "en" # Hitap style — how personas address the user # Options: formal | military | academic | casual | custom address_style: "formal" # Custom address overrides (optional) # custom_addresses: # neo: "Boss" # frodo: "Director" # ─── Active Projects (for personalized variants) ──────────────── projects: [] # Example: # - name: "My Scanner" # stack: "Python, FastAPI" # description: "Automated vulnerability scanner" # status: "production" # - name: "Intel Platform" # stack: "React, Node.js" # description: "Threat intelligence dashboard" # status: "development" # ─── Professional Context ─────────────────────────────────────── professional: company: "" role: "" certifications: [] # ["OSCP", "CEH", "CISSP"] specializations: [] # ["web-security", "CTI", "IR"] active_engagements: [] # Example: # - name: "Client X Pentest" # scope: "external + internal" # domains: 50