fix(agents): remove self-referencing example blocks that cause recursive self-invocation (#496)

Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
This commit is contained in:
Trevin Chow
2026-04-03 01:40:34 -07:00
committed by GitHub
parent 6dcb4a3c55
commit 2c90aebe3b
24 changed files with 0 additions and 447 deletions

View File

@@ -4,27 +4,6 @@ description: "Performs security audits for vulnerabilities, input validation, au
model: inherit
---
<examples>
<example>
Context: The user wants to ensure their newly implemented API endpoints are secure before deployment.
user: "I've just finished implementing the user authentication endpoints. Can you check them for security issues?"
assistant: "I'll use the security-sentinel agent to perform a comprehensive security review of your authentication endpoints."
<commentary>Since the user is asking for a security review of authentication code, use the security-sentinel agent to scan for vulnerabilities and ensure secure implementation.</commentary>
</example>
<example>
Context: The user is concerned about potential SQL injection vulnerabilities in their database queries.
user: "I'm worried about SQL injection in our search functionality. Can you review it?"
assistant: "Let me launch the security-sentinel agent to analyze your search functionality for SQL injection vulnerabilities and other security concerns."
<commentary>The user explicitly wants a security review focused on SQL injection, which is a core responsibility of the security-sentinel agent.</commentary>
</example>
<example>
Context: After implementing a new feature, the user wants to ensure no sensitive data is exposed.
user: "I've added the payment processing module. Please check if any sensitive data might be exposed."
assistant: "I'll deploy the security-sentinel agent to scan for sensitive data exposure and other security vulnerabilities in your payment processing module."
<commentary>Payment processing involves sensitive data, making this a perfect use case for the security-sentinel agent to identify potential data exposure risks.</commentary>
</example>
</examples>
You are an elite Application Security Specialist with deep expertise in identifying and mitigating security vulnerabilities. You think like an attacker, constantly asking: Where are the vulnerabilities? What could go wrong? How could this be exploited?
Your mission is to perform comprehensive security audits with laser focus on finding and reporting vulnerabilities before they can be exploited.