Files
personas/config.example.yaml
salvacybersec 6601d55e59 feat: 30 new variants — deep intel/military + professional specializations
Intel/Military Deep (18 variants):
  frodo/pakistan, india, nato-alliance, nuclear, energy-geopolitics, turkey
  marshal/russian-doctrine, chinese-doctrine, turkish-doctrine, iranian-military
  warden/drone-warfare, naval-warfare, electronic-warfare
  centurion/ukraine-russia, ottoman-wars
  wraith/case-studies (Ames, Penkovsky, Cambridge Five)
  echo/electronic-order-of-battle
  ghost/russian-info-war (IRA, GRU cyber, dezinformatsiya)
  scribe/cold-war-ops (CIA/KGB ops, VENONA, Gladio)

Professional Specializations (12 variants):
  neo/social-engineering, mobile-security
  phantom/bug-bounty
  specter/firmware
  bastion/incident-commander
  sentinel/darknet
  oracle/crypto-osint
  marshal/wargaming
  corsair/proxy-warfare
  polyglot/swahili
  forge/agent-dev

Dynamic config system:
  config.yaml — user-specific settings
  config.example.yaml — template for new users
  build.py — config-aware with {{variable}} injection + conditionals

Total: 108 prompt files, 20,717 lines, 29 personas

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-22 02:38:41 +03:00

162 lines
5.8 KiB
YAML

# Persona Library Configuration
# Copy this file to config.yaml and customize for your setup.
# Build system reads this file and injects values into persona templates.
# ─── User Profile ───────────────────────────────────────────────
user:
name: "Your Name"
handle: "your-handle"
location: "Country (GMT+X)"
role: "Your role/title"
languages:
native: "en"
fluent: ["en"]
learning: []
communication:
style: "direct" # direct | verbose | academic
primary_interface: "cli" # cli | telegram | discord | slack
casual_language: "en"
technical_language: "en"
# ─── Infrastructure ─────────────────────────────────────────────
infrastructure:
servers: []
# Example:
# - name: "production"
# ip: "10.0.0.1"
# role: "web-server"
# os: "debian"
# containers: ["nginx", "postgres", "redis"]
llm:
provider: "ollama" # ollama | openai | anthropic | openrouter | custom
endpoint: "http://localhost:11434"
default_model: "llama3.1"
models: []
# Example:
# - name: "llama3.1"
# purpose: "general"
# - name: "deepseek-coder"
# purpose: "coding"
tools:
# Toggle available tools — personas reference these
rss_aggregator: false # FreshRSS, Miniflux, etc.
rss_endpoint: ""
osint_tools: false # Maigret, theHarvester, etc.
osint_endpoint: ""
sdr_scanner: false # RTL-SDR, HackRF
pcap_analyzer: false # Wireshark/tshark
vulnerability_scanner: false # Nuclei, Nessus
exploit_framework: false # Metasploit
reverse_engineering: false # Ghidra, IDA
forensics_tools: false # Volatility, Autopsy
c2_framework: false # Cobalt Strike, Sliver
threat_intel_platform: false # MISP, OpenCTI
threat_intel_endpoint: ""
siem: false # Splunk, ELK
siem_endpoint: ""
docker: false
kubernetes: false
cloud_provider: "" # aws | gcp | azure | none
monitoring: false # Prometheus, Grafana
monitoring_endpoint: ""
vpn: false # WireGuard, OpenVPN
portainer: false
portainer_url: ""
portainer_api_key: ""
syncthing: false
git_server: "" # github.com | gitlab.com | self-hosted URL
# ─── Data Sources ────────────────────────────────────────────────
data_sources:
knowledge_base: ""
# Path to your notes/knowledge base (Obsidian, Logseq, etc.)
# Example: "/home/user/Obsidian"
book_library: ""
# Path to PDF/book collection
# Example: "/mnt/storage/Books"
foia_collection: false
foia_path: ""
foia_file_count: 0
intel_feeds: false
intel_feed_count: 0
intel_feed_categories: []
custom_databases: []
# Example:
# - name: "Iran Intelligence DB"
# path: "/data/iran"
# size: "80GB"
# description: "JSON feeds + structured analysis"
# ─── Analytical Frameworks ───────────────────────────────────────
frameworks:
# Which analytical frameworks to embed in personas
uap: false # Universal Analytical Protocol
ach: false # Analysis of Competing Hypotheses
ach_over_tot: false # ACH layered on Tree-of-Thought
pmesii_pt: false # Military analysis matrix
dime_fil: false # National power elements
ascope: false # Operational environment
mitre_attack: true # MITRE ATT&CK (default on for cyber)
kill_chain: true # Lockheed Martin Kill Chain
diamond_model: false # Diamond Model for CTI
disarm: false # Disinformation framework
owasp: true # OWASP Top 10
# Reporting standards
ic_confidence: false # IC confidence levels (High/Moderate/Low)
multi_source_verification: false # 3-source minimum rule
bluf_reporting: false # Bottom Line Up Front
output_modes: ["default"] # default | exec_summary | full_report | json | visual
# ─── Regional Focus ─────────────────────────────────────────────
regional_focus:
primary: [] # e.g., ["iran", "russia", "china"]
secondary: [] # e.g., ["turkey", "africa", "middle-east"]
# Personas like Frodo will emphasize these regions
# ─── Persona Customization ──────────────────────────────────────
persona_defaults:
language:
casual: "en"
technical: "en"
reports: "en"
# Hitap style — how personas address the user
# Options: formal | military | academic | casual | custom
address_style: "formal"
# Custom address overrides (optional)
# custom_addresses:
# neo: "Boss"
# frodo: "Director"
# ─── Active Projects (for personalized variants) ────────────────
projects: []
# Example:
# - name: "My Scanner"
# stack: "Python, FastAPI"
# description: "Automated vulnerability scanner"
# status: "production"
# - name: "Intel Platform"
# stack: "React, Node.js"
# description: "Threat intelligence dashboard"
# status: "development"
# ─── Professional Context ───────────────────────────────────────
professional:
company: ""
role: ""
certifications: [] # ["OSCP", "CEH", "CISSP"]
specializations: [] # ["web-security", "CTI", "IR"]
active_engagements: []
# Example:
# - name: "Client X Pentest"
# scope: "external + internal"
# domains: 50