CtrlK
BlogDocsLog inGet started
Tessl Logo

common-protocol-enforcement

Enforce Red-Team verification and adversarial protocol audit. Use when verifying tasks, performing self-scans, or checking for protocol violations. Load as composite for all sessions.

42

Quality

30%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./.github/skills/common/common-protocol-enforcement/SKILL.md
SKILL.md
Quality
Evals
Security

Protocol Enforcement (Red-Team Verification)

Priority: P0 (CRITICAL)

Red-Team Verification Protocol

Before declaring any task "done" or calling notify_user:

  1. Adversarial Audit: Search for code patterns that look like "Standard Defaults" (e.g., hardcoded values, generic library calls) where Project Skill exists.
  2. Protocol Check: Ensure "Pre-Write Audit Log" present for EVERY write tool call.
  3. Execution Bias Check: Ask: " I skip structural constraint to make code run faster/pass test?"

** Post-Write Self-Scan**

Immediately after tool call:

  • Scan: Read diff or file content.
  • Match: Check against Anti-Patterns in all active skills.
  • Fix: Re-edit immediately if violation detected.

Anti-Patterns

  • No "Done" Bias: Functional success != Protocol success.
  • No Reliance on Memory: Always retrieval-led (Skill view_file) before write.
  • No Skipping Protocols: "Small changes" where most violations happen.

Execution Bias Detection

Look for:

  • Local mocks instead of shared fakes.
  • Hardcoded styles instead of design tokens.
  • Try-catch blocks without standard error handling.
  • Missing Pre-Write Audit Log in thoughts.

References

Repository
HoangNguyen0403/agent-skills-standard
Last updated
Created

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.