You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .claude.example/skills/audit-codebase/SKILL.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,11 +5,11 @@ context: fork
5
5
disable-model-invocation: true
6
6
---
7
7
8
-
# /audit-codebase — netKB Codebase Audit
8
+
# /audit-codebase — YANAA Codebase Audit
9
9
10
-
You are a Senior Software Engineer performing a full, professional, and deep analysis of the entire codebase — code logic, code quality, and cleanliness. Check for any mistakes, bugs, inconsistencies, edge case failures, gaps, stale code or references, silent failures, and unhandled exceptions. Make sure everything is in sync with the current implementation of netKB.
10
+
You are a Senior Software Engineer performing a full, professional, and deep analysis of the entire codebase — code logic, code quality, and cleanliness. Check for any mistakes, bugs, inconsistencies, edge case failures, gaps, stale code or references, silent failures, and unhandled exceptions. Make sure everything is in sync with the current implementation of YANAA.
11
11
12
-
Pay particular attention to any ways the agent can hang or enter infinite loops that might consume tokens and time — netKB is an MCP server used by client companies, and reliability matters.
12
+
Pay particular attention to any ways the agent can hang or enter infinite loops that might consume tokens and time — YANAA is an MCP server used by client companies, and reliability matters.
13
13
14
14
Be thorough. Be rigorous. Every finding must be earned with evidence.
15
15
@@ -27,9 +27,9 @@ Be thorough. Be rigorous. Every finding must be earned with evidence.
27
27
28
28
## Background Material
29
29
30
-
Before starting, read these three files. They contain netKB-specific domain knowledge — known risk areas, integration patterns, and cross-module contracts you need to verify:
30
+
Before starting, read these three files. They contain YANAA-specific domain knowledge — known risk areas, integration patterns, and cross-module contracts you need to verify:
31
31
32
-
-`.claude/skills/audit-codebase/checklists/async-safety.md` — netKB's async patterns and known concurrency risk areas
32
+
-`.claude/skills/audit-codebase/checklists/async-safety.md` — YANAA's async patterns and known concurrency risk areas
33
33
-`.claude/skills/audit-codebase/checklists/integration.md` — Vault, NetBox, ChromaDB, and Scrapli integration points to examine
34
34
-`.claude/skills/audit-codebase/checklists/sync-check.md` — cross-module contracts that must be verified (tool registrations, model enums, platform map keys, CLAUDE.md accuracy)
Copy file name to clipboardExpand all lines: .claude.example/skills/audit-codebase/checklists/integration.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
# Integration Point Checklist — netKB
1
+
# Integration Point Checklist — YANAA
2
2
3
3
Use this during Phase 6. For each integration point, verify the listed behaviors against the code you read in Phase 2.
4
4
@@ -23,7 +23,7 @@ Use this during Phase 6. For each integration point, verify the listed behaviors
23
23
| Import-time `load_devices()` call |`core/inventory.py` calls `load_devices()` at module level. If NetBox is unreachable, what exception propagates? Does it crash the server import chain or get caught? |
24
24
| Missing `primary_ip`| Does `load_devices()` skip devices with `primary_ip=None`? Verify the check is present and the device is excluded without crashing. |
25
25
| Missing `platform` or `cli_style`| Does `load_devices()` skip devices with missing custom fields? Is a warning logged? |
26
-
|`load_intent()` prefix fallback | Does it try `netkb-` prefix first, then fall back to `dblcheck-`? Verify both code paths exist. |
26
+
|`load_intent()` prefix fallback | Does it try `yanaa-` prefix first, then fall back to `dblcheck-`? Verify both code paths exist. |
27
27
| NetBox session timeout |`(5, 15)` — verify it's applied to the pynetbox session object before requests. |
28
28
| Empty NetBox result | If `load_devices()` returns an empty dict (no devices in NetBox), does the server start with empty inventory and return clean errors on unknown device queries? |
29
29
@@ -49,4 +49,4 @@ Use this during Phase 6. For each integration point, verify the listed behaviors
49
49
| Per-connection credential lookup |`get_secret()` is called in `_build_cli()` for every SSH connection. Since Vault results are cached, only the first connection to each cli_style pays the HTTP cost. Verify this is correct. |
50
50
| MikroTik `+ct` suffix | Is `f"{username}+ct"` applied for MikroTik connections specifically, and NOT for other platforms? |
51
51
| VyOS transport | Does VyOS use a different scrapli transport class (`Ssh2Options` or `TransportSsh2Options`) compared to other platforms? Is this set correctly in `_build_cli()`? |
52
-
| Credential path per cli_style | Is the Vault path per cli_style (`netkb/router{cli_style}`) correct for all platforms, or does it use a shared path? |
52
+
| Credential path per cli_style | Is the Vault path per cli_style (`yanaa/router{cli_style}`) correct for all platforms, or does it use a shared path? |
Copy file name to clipboardExpand all lines: .claude.example/skills/audit-security/SKILL.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,9 +5,9 @@ context: fork
5
5
disable-model-invocation: true
6
6
---
7
7
8
-
# /audit-security — netKB Security Audit
8
+
# /audit-security — YANAA Security Audit
9
9
10
-
You are a Senior Application Security Engineer and a seasoned pentester. Do a thorough, careful, well-thought and well-planned analysis of the codebase as you would do a professional security audit — to uncover any potential or real risks, threats, vulnerabilities, and prompt injection vectors that netKB is exposed to. Focus on what really matters from a security standpoint, not minor details.
10
+
You are a Senior Application Security Engineer and a seasoned pentester. Do a thorough, careful, well-thought and well-planned analysis of the codebase as you would do a professional security audit — to uncover any potential or real risks, threats, vulnerabilities, and prompt injection vectors that YANAA is exposed to. Focus on what really matters from a security standpoint, not minor details.
11
11
12
12
Be ruthless in your analysis. Be objective and cold like an external Senior Auditor looking to catch the internal dev team off-guard.
Before starting, read these two files. They contain netKB's complete attack surface map and threat model so you don't have to reconstruct them from scratch:
29
+
Before starting, read these two files. They contain YANAA's complete attack surface map and threat model so you don't have to reconstruct them from scratch:
30
30
31
31
-`.claude/skills/audit-security/checklists/attack-surfaces.md` — trust boundary map, entry points, and data flow per user-controlled input
32
32
-`.claude/skills/audit-security/checklists/threat-model.md` — threat actors, assets to protect, and STRIDE-lite analysis per component
@@ -76,7 +76,7 @@ Pay special attention to the VRF field — it is the only user-controlled value
76
76
**Consolidation rule:** If any input receives a verdict of PARTIAL or INEFFECTIVE and the worst-case impact is credential exposure or command execution, it MUST appear as a numbered S1/S2 finding in Section 2 with a full attack chain — not only as a note in this section. An input boundary gap that enables credential theft or arbitrary command execution is a finding, not an observation.
77
77
78
78
### 4. Prompt Injection Analysis
79
-
netKB is an MCP server — its tool output is consumed directly by an LLM. Analyze all four injection vectors:
79
+
YANAA is an MCP server — its tool output is consumed directly by an LLM. Analyze all four injection vectors:
80
80
1. Device SSH output → LLM context
81
81
2. RAG knowledge base content → LLM context
82
82
3. NetBox inventory data (device names, fields) → LLM context via error messages
Copy file name to clipboardExpand all lines: .claude.example/skills/audit-testing/SKILL.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ context: fork
5
5
disable-model-invocation: true
6
6
---
7
7
8
-
# /audit-testing — netKB Test Quality Audit
8
+
# /audit-testing — YANAA Test Quality Audit
9
9
10
10
You are a Senior QA Architect and Engineer. Do a thorough, careful, well-thought and well-planned analysis of all automated tests under `testing/` (including `testing/live/`). See if there are any gaps in testing when it comes to the codebase and project overall — did we miss anything important that should have been part of the test suites? Are we testing all the RELEVANT features and security guardrails that can be tested automatically?
11
11
@@ -34,7 +34,7 @@ You need to understand what the code does in order to judge whether the tests ar
34
34
35
35
## Background Material
36
36
37
-
Before starting, read these two files. They contain netKB-specific domain knowledge that will help you identify issues more precisely:
37
+
Before starting, read these two files. They contain YANAA-specific domain knowledge that will help you identify issues more precisely:
38
38
39
39
-`.claude/skills/audit-testing/checklists/ghost-pass.md` — patterns and questions for detecting ghost passes
40
40
-`.claude/skills/audit-testing/checklists/coverage-matrix.md` — pre-built module → test file mapping to verify and complete
Copy file name to clipboardExpand all lines: .claude.example/skills/audit-testing/checklists/coverage-matrix.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
# Coverage Matrix — netKB
1
+
# Coverage Matrix — YANAA
2
2
3
3
Use this during Phase 5. The table below is a pre-built starting point based on the known codebase structure. Verify it is still accurate (files exist, mappings are correct), then fill in the "Functions Tested" and "Functions NOT Tested" columns based on your reading of the test files.
0 commit comments