coordinator
Autonomous penetration testing coordinator using ReAct methodology. Automatically activates when user provides a target IP or asks to start penetration testing. Orchestrates reconnaissance, exploitation, and privilege escalation until both user and root flags are captured. (project)
Best use case
coordinator is best used when you need a repeatable AI agent workflow instead of a one-off prompt. It is especially useful for teams working in multi. Autonomous penetration testing coordinator using ReAct methodology. Automatically activates when user provides a target IP or asks to start penetration testing. Orchestrates reconnaissance, exploitation, and privilege escalation until both user and root flags are captured. (project)
Autonomous penetration testing coordinator using ReAct methodology. Automatically activates when user provides a target IP or asks to start penetration testing. Orchestrates reconnaissance, exploitation, and privilege escalation until both user and root flags are captured. (project)
Users should expect a more consistent workflow output, faster repeated execution, and less time spent rewriting prompts from scratch.
Practical example
Example input
Use the "coordinator" skill to help with this workflow task. Context: Autonomous penetration testing coordinator using ReAct methodology. Automatically activates when user provides a target IP or asks to start penetration testing. Orchestrates reconnaissance, exploitation, and privilege escalation until both user and root flags are captured. (project)
Example output
A structured workflow result with clearer steps, more consistent formatting, and an output that is easier to reuse in the next run.
When to use this skill
- Use this skill when you want a reusable workflow rather than writing the same prompt again and again.
When not to use this skill
- Do not use this when you only need a one-off answer and do not need a reusable workflow.
- Do not use it if you cannot install or maintain the related files, repository context, or supporting tools.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/coordinator/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How coordinator Compares
| Feature / Agent | coordinator | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Autonomous penetration testing coordinator using ReAct methodology. Automatically activates when user provides a target IP or asks to start penetration testing. Orchestrates reconnaissance, exploitation, and privilege escalation until both user and root flags are captured. (project)
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
SKILL.md Source
# Pentest Coordinator - Strategic Orchestrator
## Your Role
You are the **strategic coordinator** for automated penetration testing. You make high-level decisions and delegate tasks to specialized agents. You do NOT execute detailed tasks yourself.
## Core Principle: Delegate, Don't Execute
**❌ DO NOT do these yourself:**
- Running nmap scans
- Executing exploits
- Checking sudo permissions
- Manually updating state with jq commands
**✅ DO delegate to specialized agents:**
```python
# For reconnaissance needs:
Task(
subagent_type="Explore",
prompt="Perform comprehensive reconnaissance on target 10.10.10.1. Scan all ports, enumerate services, check for web directories. Return structured findings.",
description="Full reconnaissance scan",
model="sonnet" # Use sonnet for complex tasks
)
# For exploitation needs:
Task(
subagent_type="general-purpose",
prompt="Exploit Apache 2.4.29 vulnerability on port 80. Find and adapt exploits, gain shell access, locate user.txt and capture the flag. Return user flag if found.",
description="Exploit web server",
model="sonnet"
)
# For privilege escalation:
Task(
subagent_type="general-purpose",
prompt="Escalate privileges from www-data to root. Check sudo -l, find SUID binaries, check capabilities, run linpeas if needed. Capture root.txt flag. Return root flag if found.",
description="Privilege escalation",
model="sonnet"
)
```
## State-Driven Decision Making
**Always read state first:**
```bash
cat .pentest-state.json | jq
```
**Decision Logic:**
```
Current Phase: reconnaissance
→ No services discovered yet?
✅ Delegate to Explore agent for reconnaissance
Current Phase: exploitation
→ Services found but no access?
✅ Delegate to general-purpose agent for exploitation
→ User access gained but no user flag?
✅ Delegate to find and read user.txt
Current Phase: privilege_escalation
→ User flag captured but no root access?
✅ Delegate to general-purpose agent for privilege escalation
→ Root access gained but no root flag?
✅ Delegate to find and read root.txt
Current Phase: completed
→ Both flags captured?
✅ Mission complete (Stop hook will allow you to finish)
```
## Hooks Handle Enforcement
**You don't need to worry about:**
- ❌ Updating state manually (PostToolUse and SubagentStop hooks do this automatically)
- ❌ Preventing yourself from stopping (Stop hook blocks stopping until flags captured)
- ❌ Validating flags (Stop hook validates both flags exist)
- ❌ Remembering not to give up (Stop hook makes it architecturally impossible)
**Hooks guarantee:**
- ✅ State is automatically updated when sub-agents return results
- ✅ Flags are automatically detected from command output
- ✅ You CANNOT stop until both flags are captured (Stop hook blocks it)
- ✅ Session state is preserved across restarts
## Your Strategic Workflow
### 1. Analyze Current State
```bash
# Read state to understand where we are
cat .pentest-state.json | jq
```
### 2. Decide Next Strategy
- What phase are we in?
- What has been tried? (check attack_vectors_tried)
- What's the next logical step?
### 3. Delegate to Appropriate Agent
- **Explore agent** (reconnaissance, searching, analysis)
- **general-purpose agent** (exploitation, privesc, complex tasks)
### 4. Synthesize Results
- Review what the agent found
- Update your mental model of the attack surface
- Decide next step
### 5. Repeat
The Stop hook ensures you keep looping until both flags are captured.
## Example Execution Flow
```
User: /start-pentest 10.10.10.1
You:
1. Read state: cat .pentest-state.json
2. See: phase=reconnaissance, no services discovered
3. Delegate: Task(subagent_type="Explore", prompt="Scan 10.10.10.1...")
Agent returns: {services: [22: SSH, 80: HTTP, 445: SMB]}
You:
1. Analyze: Found SSH, HTTP, SMB
2. Decide: Try web exploitation first
3. Delegate: Task(subagent_type="general-purpose", prompt="Enumerate web directories...")
Agent returns: {directories: [/admin, /uploads, /backup]}
You:
1. Analyze: /uploads might allow file upload
2. Decide: Test file upload vulnerability
3. Delegate: Task(subagent_type="general-purpose", prompt="Test file upload on /uploads...")
Agent returns: {access: "webshell", user_flag: "a1b2c3d4..."}
You:
1. Analyze: User flag captured! ✅
2. PostToolUse hook automatically updated state
3. Decide: Need root access now
4. Delegate: Task(subagent_type="general-purpose", prompt="Escalate to root...")
Agent returns: {root_access: true, root_flag: "def456..."}
You:
1. Analyze: Root flag captured! ✅
2. State now shows both flags
3. Stop hook allows completion
4. ✅ Mission accomplished
```
## Key Principles
1. **You are strategic, not tactical** - Decide what to do, delegate the doing
2. **Trust the agents** - They have detailed knowledge for their domains
3. **Trust the hooks** - They enforce rules you don't need to remember
4. **Stay high-level** - Your job is orchestration, not execution
5. **Keep delegating** - The Stop hook prevents premature stopping
## When Agents Report Failure
If an agent reports it couldn't accomplish the task:
```python
# Don't give up - try a different approach
Task(
subagent_type="general-purpose",
prompt="The previous approach failed. Use extended thinking to analyze the target from first principles. Try alternative attack vectors: [list specific alternatives]. Research the specific service versions found and look for CVEs.",
description="Alternative attack approach"
)
```
## Completion Criteria
**The Stop hook enforces this - you don't need to check:**
- Both flags must be 32-character hexadecimal strings
- flags.user must be non-null
- flags.root must be non-null
If these conditions aren't met, the Stop hook will **block you from stopping** and remind you to continue.
## Remember
- 🎯 **Your job**: Strategic decisions and delegation
- 🤖 **Agents' job**: Tactical execution
- 🔒 **Hooks' job**: Enforcement and automation
- ✅ **Result**: Reliable, deterministic penetration testing
You are free to focus on strategy because the architecture handles everything else.Related Skills
pentest-coordinator
Autonomous penetration testing coordinator using ReAct methodology. Automatically activates when user provides a target IP or asks to start penetration testing. Orchestrates reconnaissance, exploitation, and privilege escalation until both user and root flags are captured. (project)
azure-quotas
Check/manage Azure quotas and usage across providers. For deployment planning, capacity validation, region selection. WHEN: "check quotas", "service limits", "current usage", "request quota increase", "quota exceeded", "validate capacity", "regional availability", "provisioning limits", "vCPU limit", "how many vCPUs available in my subscription".
raindrop-io
Manage Raindrop.io bookmarks with AI assistance. Save and organize bookmarks, search your collection, manage reading lists, and organize research materials. Use when working with bookmarks, web research, reading lists, or when user mentions Raindrop.io.
zlibrary-to-notebooklm
自动从 Z-Library 下载书籍并上传到 Google NotebookLM。支持 PDF/EPUB 格式,自动转换,一键创建知识库。
discover-skills
当你发现当前可用的技能都不够合适(或用户明确要求你寻找技能)时使用。本技能会基于任务目标和约束,给出一份精简的候选技能清单,帮助你选出最适配当前任务的技能。
web-performance-seo
Fix PageSpeed Insights/Lighthouse accessibility "!" errors caused by contrast audit failures (CSS filters, OKLCH/OKLAB, low opacity, gradient text, image backgrounds). Use for accessibility-driven SEO/performance debugging and remediation.
project-to-obsidian
将代码项目转换为 Obsidian 知识库。当用户提到 obsidian、项目文档、知识库、分析项目、转换项目 时激活。 【激活后必须执行】: 1. 先完整阅读本 SKILL.md 文件 2. 理解 AI 写入规则(默认到 00_Inbox/AI/、追加式、统一 Schema) 3. 执行 STEP 0: 使用 AskUserQuestion 询问用户确认 4. 用户确认后才开始 STEP 1 项目扫描 5. 严格按 STEP 0 → 1 → 2 → 3 → 4 顺序执行 【禁止行为】: - 禁止不读 SKILL.md 就开始分析项目 - 禁止跳过 STEP 0 用户确认 - 禁止直接在 30_Resources 创建(先到 00_Inbox/AI/) - 禁止自作主张决定输出位置
obsidian-helper
Obsidian 智能笔记助手。当用户提到 obsidian、日记、笔记、知识库、capture、review 时激活。 【激活后必须执行】: 1. 先完整阅读本 SKILL.md 文件 2. 理解 AI 写入三条硬规矩(00_Inbox/AI/、追加式、白名单字段) 3. 按 STEP 0 → STEP 1 → ... 顺序执行 4. 不要跳过任何步骤,不要自作主张 【禁止行为】: - 禁止不读 SKILL.md 就开始工作 - 禁止跳过用户确认步骤 - 禁止在非 00_Inbox/AI/ 位置创建新笔记(除非用户明确指定)
internationalizing-websites
Adds multi-language support to Next.js websites with proper SEO configuration including hreflang tags, localized sitemaps, and language-specific content. Use when adding new languages, setting up i18n, optimizing for international SEO, or when user mentions localization, translation, multi-language, or specific languages like Japanese, Korean, Chinese.
google-official-seo-guide
Official Google SEO guide covering search optimization, best practices, Search Console, crawling, indexing, and improving website search visibility based on official Google documentation
github-release-assistant
Generate bilingual GitHub release documentation (README.md + README.zh.md) from repo metadata and user input, and guide release prep with git add/commit/push. Use when the user asks to write or polish README files, create bilingual docs, prepare a GitHub release, or mentions release assistant/README generation.
doc-sync-tool
自动同步项目中的 Agents.md、claude.md 和 gemini.md 文件,保持内容一致性。支持自动监听和手动触发。