amp-team-usage

Amp Team Usage

16 stars

Best use case

amp-team-usage is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

Amp Team Usage

Teams using amp-team-usage should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/amp-team-usage/SKILL.md --create-dirs "https://raw.githubusercontent.com/plurigrid/asi/main/plugins/asi/skills/amp-team-usage/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/amp-team-usage/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How amp-team-usage Compares

Feature / Agentamp-team-usageStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Amp Team Usage

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

SKILL.md Source

# Amp Team Usage

Check concurrent users and team members on an Amp account.

## Problem

Amp CLI has no direct command for viewing team/workspace members or concurrent sessions. The web dashboard requires manual login.

## Solution

### 1. Local Concurrent Sessions

Count running Amp processes on the local machine:

```bash
ps aux | grep -E 'amp.*dist/main.js' | grep -v grep | wc -l
```

Detailed view:

```bash
ps aux | grep -E 'amp.*dist/main.js' | grep -v grep
```

### 2. Team Members via GitHub CLI

If Amp workspace is linked to a GitHub org:

```bash
# List org members
gh api orgs/YOUR_ORG/members | jq -r '.[].login'

# Full details with GraphQL
gh api graphql -f query='
{
  organization(login: "YOUR_ORG") {
    membersWithRole(first: 50) {
      totalCount
      nodes {
        login
        name
      }
    }
  }
}' | jq
```

### 3. Recent Thread Activity

Check thread activity across the account:

```bash
# Use find_thread tool with date filters
find_thread query="after:1d" limit=50
```

## What Didn't Work

- `amp --help` has no team/account commands
- `amp workspace list`, `amp team list`, `amp account` don't exist
- Direct API calls to `ampcode.com/api/team` require browser auth
- Playwright login requires interactive Google OAuth

## Quick Reference

| Method | Command |
|--------|---------|
| Local sessions | `ps aux \| grep 'amp.*main.js' \| grep -v grep \| wc -l` |
| Org members | `gh api orgs/ORG/members \| jq '.[].login'` |
| Member count | `gh api graphql -f query='{organization(login:"ORG"){membersWithRole{totalCount}}}'` |



## Scientific Skill Interleaving

This skill connects to the K-Dense-AI/claude-scientific-skills ecosystem:

### Graph Theory
- **networkx** [○] via bicomodule
  - Universal graph hub

### Bibliography References

- `general`: 734 citations in bib.duckdb

## Cat# Integration

This skill maps to **Cat# = Comod(P)** as a bicomodule in the equipment structure:

```
Trit: 0 (ERGODIC)
Home: Prof
Poly Op: ⊗
Kan Role: Adj
Color: #26D826
```

### GF(3) Naturality

The skill participates in triads satisfying:
```
(-1) + (0) + (+1) ≡ 0 (mod 3)
```

This ensures compositional coherence in the Cat# equipment structure.

Related Skills

RedTeam

16
from plurigrid/asi

32 adversarial agents to destroy weak arguments and find fatal flaws — parallel analysis and adversarial validation. USE WHEN red team, attack idea, counterarguments, critique, stress test, poke holes, devil's advocate, find weaknesses, break this, parallel analysis, adversarial validation.

performing-threat-emulation-with-atomic-red-team

16
from plurigrid/asi

Executes Atomic Red Team tests for MITRE ATT&CK technique validation using the atomic-operator Python framework. Loads test definitions from YAML atomics, runs attack simulations, and validates detection coverage. Use when testing SIEM detection rules, validating EDR coverage, or conducting purple team exercises.

performing-red-team-with-covenant

16
from plurigrid/asi

Conduct red team operations using the Covenant C2 framework for authorized adversary simulation, including listener setup, grunt deployment, task execution, and lateral movement tracking.

performing-red-team-phishing-with-gophish

16
from plurigrid/asi

Automate GoPhish phishing simulation campaigns using the Python gophish library. Creates email templates with tracking pixels, configures SMTP sending profiles, builds target groups from CSV, launches campaigns, and analyzes results including open rates, click rates, and credential submission statistics for security awareness assessment.

performing-purple-team-exercise

16
from plurigrid/asi

Performs purple team exercises by coordinating red team adversary emulation with blue team detection validation using MITRE ATT&CK-mapped attack scenarios, real-time detection testing, and collaborative gap remediation. Use when SOC teams need to validate detection capabilities, improve analyst skills, and close detection gaps through structured offensive-defensive collaboration.

performing-purple-team-atomic-testing

16
from plurigrid/asi

Executes Atomic Red Team tests mapped to MITRE ATT&CK techniques, performs coverage gap analysis across the ATT&CK matrix, and runs detection validation loops to measure blue team visibility. Covers Invoke-AtomicRedTeam PowerShell execution, ATT&CK Navigator layer generation for heatmaps, Sigma rule correlation, and continuous atomic testing pipelines. Activates for requests involving purple team exercises, atomic test execution, ATT&CK coverage assessment, detection engineering validation, or adversary emulation testing.

executing-red-team-exercise

16
from plurigrid/asi

Executes comprehensive red team exercises that simulate real-world adversary operations against an organization's people, processes, and technology. The red team operates with stealth as a primary objective, employing the full attack lifecycle from initial reconnaissance through objective completion while testing the organization's detection and response capabilities. This differs from penetration testing by focusing on adversary emulation rather than vulnerability identification. Activates for requests involving red team exercise, adversary simulation, adversary emulation, or full-scope offensive security assessment.

executing-red-team-engagement-planning

16
from plurigrid/asi

Red team engagement planning is the foundational phase that defines scope, objectives, rules of engagement (ROE), threat model selection, and operational timelines before any offensive testing begins.

detecting-shadow-it-cloud-usage

16
from plurigrid/asi

Detect unauthorized SaaS and cloud service usage (shadow IT) by analyzing proxy logs, DNS query logs, and netflow data using Python pandas for traffic pattern analysis and domain classification.

conducting-full-scope-red-team-engagement

16
from plurigrid/asi

Plan and execute a comprehensive red team engagement covering reconnaissance through post-exploitation using MITRE ATT&CK-aligned TTPs to evaluate an organization's detection and response capabilities.

building-red-team-c2-infrastructure-with-havoc

16
from plurigrid/asi

Deploy and configure the Havoc C2 framework with teamserver, HTTPS listeners, redirectors, and Demon agents for authorized red team operations.

zx-calculus

16
from plurigrid/asi

Coecke's ZX-calculus for quantum circuit reasoning via string diagrams with Z-spiders (green) and X-spiders (red)