Skip to content

Commit a5894af

Browse files
committed
Updates to v1.0.0
1 parent 4acf624 commit a5894af

41 files changed

Lines changed: 1571 additions & 161 deletions

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.claude.example/settings.local.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"permissions": {
33
"allow": [
4-
"mcp__netkb__*",
4+
"mcp__yanaa__*",
55
"Bash(netkb/bin/python:*)",
66
"Bash(netkb/bin/pip:*)",
77
"Bash(ls:*)"

.claude.example/skills/audit-codebase/SKILL.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,11 @@ context: fork
55
disable-model-invocation: true
66
---
77

8-
# /audit-codebase — netKB Codebase Audit
8+
# /audit-codebase — YANAA Codebase Audit
99

10-
You are a Senior Software Engineer performing a full, professional, and deep analysis of the entire codebase — code logic, code quality, and cleanliness. Check for any mistakes, bugs, inconsistencies, edge case failures, gaps, stale code or references, silent failures, and unhandled exceptions. Make sure everything is in sync with the current implementation of netKB.
10+
You are a Senior Software Engineer performing a full, professional, and deep analysis of the entire codebase — code logic, code quality, and cleanliness. Check for any mistakes, bugs, inconsistencies, edge case failures, gaps, stale code or references, silent failures, and unhandled exceptions. Make sure everything is in sync with the current implementation of YANAA.
1111

12-
Pay particular attention to any ways the agent can hang or enter infinite loops that might consume tokens and time — netKB is an MCP server used by client companies, and reliability matters.
12+
Pay particular attention to any ways the agent can hang or enter infinite loops that might consume tokens and time — YANAA is an MCP server used by client companies, and reliability matters.
1313

1414
Be thorough. Be rigorous. Every finding must be earned with evidence.
1515

@@ -27,9 +27,9 @@ Be thorough. Be rigorous. Every finding must be earned with evidence.
2727

2828
## Background Material
2929

30-
Before starting, read these three files. They contain netKB-specific domain knowledge — known risk areas, integration patterns, and cross-module contracts you need to verify:
30+
Before starting, read these three files. They contain YANAA-specific domain knowledge — known risk areas, integration patterns, and cross-module contracts you need to verify:
3131

32-
- `.claude/skills/audit-codebase/checklists/async-safety.md`netKB's async patterns and known concurrency risk areas
32+
- `.claude/skills/audit-codebase/checklists/async-safety.md`YANAA's async patterns and known concurrency risk areas
3333
- `.claude/skills/audit-codebase/checklists/integration.md` — Vault, NetBox, ChromaDB, and Scrapli integration points to examine
3434
- `.claude/skills/audit-codebase/checklists/sync-check.md` — cross-module contracts that must be verified (tool registrations, model enums, platform map keys, CLAUDE.md accuracy)
3535

.claude.example/skills/audit-codebase/checklists/async-safety.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Async Safety Checklist — netKB
1+
# Async Safety Checklist — YANAA
22

33
Use this during Phase 3. For each item, determine PASS, FAIL, or N/A based on the code you read in Phase 2.
44

.claude.example/skills/audit-codebase/checklists/integration.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Integration Point Checklist — netKB
1+
# Integration Point Checklist — YANAA
22

33
Use this during Phase 6. For each integration point, verify the listed behaviors against the code you read in Phase 2.
44

@@ -23,7 +23,7 @@ Use this during Phase 6. For each integration point, verify the listed behaviors
2323
| Import-time `load_devices()` call | `core/inventory.py` calls `load_devices()` at module level. If NetBox is unreachable, what exception propagates? Does it crash the server import chain or get caught? |
2424
| Missing `primary_ip` | Does `load_devices()` skip devices with `primary_ip=None`? Verify the check is present and the device is excluded without crashing. |
2525
| Missing `platform` or `cli_style` | Does `load_devices()` skip devices with missing custom fields? Is a warning logged? |
26-
| `load_intent()` prefix fallback | Does it try `netkb-` prefix first, then fall back to `dblcheck-`? Verify both code paths exist. |
26+
| `load_intent()` prefix fallback | Does it try `yanaa-` prefix first, then fall back to `dblcheck-`? Verify both code paths exist. |
2727
| NetBox session timeout | `(5, 15)` — verify it's applied to the pynetbox session object before requests. |
2828
| Empty NetBox result | If `load_devices()` returns an empty dict (no devices in NetBox), does the server start with empty inventory and return clean errors on unknown device queries? |
2929

@@ -49,4 +49,4 @@ Use this during Phase 6. For each integration point, verify the listed behaviors
4949
| Per-connection credential lookup | `get_secret()` is called in `_build_cli()` for every SSH connection. Since Vault results are cached, only the first connection to each cli_style pays the HTTP cost. Verify this is correct. |
5050
| MikroTik `+ct` suffix | Is `f"{username}+ct"` applied for MikroTik connections specifically, and NOT for other platforms? |
5151
| VyOS transport | Does VyOS use a different scrapli transport class (`Ssh2Options` or `TransportSsh2Options`) compared to other platforms? Is this set correctly in `_build_cli()`? |
52-
| Credential path per cli_style | Is the Vault path per cli_style (`netkb/router{cli_style}`) correct for all platforms, or does it use a shared path? |
52+
| Credential path per cli_style | Is the Vault path per cli_style (`yanaa/router{cli_style}`) correct for all platforms, or does it use a shared path? |

.claude.example/skills/audit-codebase/checklists/sync-check.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Component Synchronization Checklist — netKB
1+
# Component Synchronization Checklist — YANAA
22

33
Use this during Phase 7. For each check, verify the cross-module contract holds. Report PASS or FAIL with evidence (file:line).
44

.claude.example/skills/audit-security/SKILL.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@ context: fork
55
disable-model-invocation: true
66
---
77

8-
# /audit-security — netKB Security Audit
8+
# /audit-security — YANAA Security Audit
99

10-
You are a Senior Application Security Engineer and a seasoned pentester. Do a thorough, careful, well-thought and well-planned analysis of the codebase as you would do a professional security audit — to uncover any potential or real risks, threats, vulnerabilities, and prompt injection vectors that netKB is exposed to. Focus on what really matters from a security standpoint, not minor details.
10+
You are a Senior Application Security Engineer and a seasoned pentester. Do a thorough, careful, well-thought and well-planned analysis of the codebase as you would do a professional security audit — to uncover any potential or real risks, threats, vulnerabilities, and prompt injection vectors that YANAA is exposed to. Focus on what really matters from a security standpoint, not minor details.
1111

1212
Be ruthless in your analysis. Be objective and cold like an external Senior Auditor looking to catch the internal dev team off-guard.
1313

@@ -26,7 +26,7 @@ Deployment: `.github/workflows/ci.yml`, `requirements.txt`
2626

2727
## Background Material
2828

29-
Before starting, read these two files. They contain netKB's complete attack surface map and threat model so you don't have to reconstruct them from scratch:
29+
Before starting, read these two files. They contain YANAA's complete attack surface map and threat model so you don't have to reconstruct them from scratch:
3030

3131
- `.claude/skills/audit-security/checklists/attack-surfaces.md` — trust boundary map, entry points, and data flow per user-controlled input
3232
- `.claude/skills/audit-security/checklists/threat-model.md` — threat actors, assets to protect, and STRIDE-lite analysis per component
@@ -76,7 +76,7 @@ Pay special attention to the VRF field — it is the only user-controlled value
7676
**Consolidation rule:** If any input receives a verdict of PARTIAL or INEFFECTIVE and the worst-case impact is credential exposure or command execution, it MUST appear as a numbered S1/S2 finding in Section 2 with a full attack chain — not only as a note in this section. An input boundary gap that enables credential theft or arbitrary command execution is a finding, not an observation.
7777

7878
### 4. Prompt Injection Analysis
79-
netKB is an MCP server — its tool output is consumed directly by an LLM. Analyze all four injection vectors:
79+
YANAA is an MCP server — its tool output is consumed directly by an LLM. Analyze all four injection vectors:
8080
1. Device SSH output → LLM context
8181
2. RAG knowledge base content → LLM context
8282
3. NetBox inventory data (device names, fields) → LLM context via error messages

.claude.example/skills/audit-security/checklists/attack-surfaces.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
1-
# Attack Surfaces — netKB
1+
# Attack Surfaces — YANAA
22

3-
Use this during Phase 3. This defines every entry point into netKB and the data flow for each user-controlled input.
3+
Use this during Phase 3. This defines every entry point into YANAA and the data flow for each user-controlled input.
44

55
---
66

@@ -12,7 +12,7 @@ Use this during Phase 3. This defines every entry point into netKB and the data
1212
| Tool calls (JSON arguments, LLM-generated, untrusted)
1313
| No authentication layer
1414
v
15-
[netKB MCP Server — FastMCP]
15+
[YANAA MCP Server — FastMCP]
1616
|
1717
|-- search_knowledge_base ──> [ChromaDB / HuggingFace Embeddings] (local)
1818
|
@@ -82,7 +82,7 @@ MCP tool call
8282
→ command_template.replace("{vrf}", vrf_name)
8383
→ SSH command string sent to device
8484
```
85-
**Risk zone:** String interpolation into CLI command. This is the highest-risk data flow in netKB.
85+
**Risk zone:** String interpolation into CLI command. This is the highest-risk data flow in YANAA.
8686
Key question: Does `_VRF_RE` reject all values that could alter command semantics?
8787

8888
### `query` (KBQuery)

.claude.example/skills/audit-security/checklists/threat-model.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Threat Model — netKB
1+
# Threat Model — YANAA
22

33
Use this during Phase 3 and Phase 8 (self-challenge). Defines the realistic threat actors, assets to protect, and STRIDE-lite analysis per component.
44

.claude.example/skills/audit-testing/SKILL.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ context: fork
55
disable-model-invocation: true
66
---
77

8-
# /audit-testing — netKB Test Quality Audit
8+
# /audit-testing — YANAA Test Quality Audit
99

1010
You are a Senior QA Architect and Engineer. Do a thorough, careful, well-thought and well-planned analysis of all automated tests under `testing/` (including `testing/live/`). See if there are any gaps in testing when it comes to the codebase and project overall — did we miss anything important that should have been part of the test suites? Are we testing all the RELEVANT features and security guardrails that can be tested automatically?
1111

@@ -34,7 +34,7 @@ You need to understand what the code does in order to judge whether the tests ar
3434

3535
## Background Material
3636

37-
Before starting, read these two files. They contain netKB-specific domain knowledge that will help you identify issues more precisely:
37+
Before starting, read these two files. They contain YANAA-specific domain knowledge that will help you identify issues more precisely:
3838

3939
- `.claude/skills/audit-testing/checklists/ghost-pass.md` — patterns and questions for detecting ghost passes
4040
- `.claude/skills/audit-testing/checklists/coverage-matrix.md` — pre-built module → test file mapping to verify and complete

.claude.example/skills/audit-testing/checklists/coverage-matrix.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Coverage Matrix — netKB
1+
# Coverage Matrix — YANAA
22

33
Use this during Phase 5. The table below is a pre-built starting point based on the known codebase structure. Verify it is still accurate (files exist, mappings are correct), then fill in the "Functions Tested" and "Functions NOT Tested" columns based on your reading of the test files.
44

0 commit comments

Comments
 (0)