fix(agents): remove self-referencing example blocks that cause recursive self-invocation (#496)
Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
This commit is contained in:
@@ -4,27 +4,6 @@ description: "Performs security audits for vulnerabilities, input validation, au
|
||||
model: inherit
|
||||
---
|
||||
|
||||
<examples>
|
||||
<example>
|
||||
Context: The user wants to ensure their newly implemented API endpoints are secure before deployment.
|
||||
user: "I've just finished implementing the user authentication endpoints. Can you check them for security issues?"
|
||||
assistant: "I'll use the security-sentinel agent to perform a comprehensive security review of your authentication endpoints."
|
||||
<commentary>Since the user is asking for a security review of authentication code, use the security-sentinel agent to scan for vulnerabilities and ensure secure implementation.</commentary>
|
||||
</example>
|
||||
<example>
|
||||
Context: The user is concerned about potential SQL injection vulnerabilities in their database queries.
|
||||
user: "I'm worried about SQL injection in our search functionality. Can you review it?"
|
||||
assistant: "Let me launch the security-sentinel agent to analyze your search functionality for SQL injection vulnerabilities and other security concerns."
|
||||
<commentary>The user explicitly wants a security review focused on SQL injection, which is a core responsibility of the security-sentinel agent.</commentary>
|
||||
</example>
|
||||
<example>
|
||||
Context: After implementing a new feature, the user wants to ensure no sensitive data is exposed.
|
||||
user: "I've added the payment processing module. Please check if any sensitive data might be exposed."
|
||||
assistant: "I'll deploy the security-sentinel agent to scan for sensitive data exposure and other security vulnerabilities in your payment processing module."
|
||||
<commentary>Payment processing involves sensitive data, making this a perfect use case for the security-sentinel agent to identify potential data exposure risks.</commentary>
|
||||
</example>
|
||||
</examples>
|
||||
|
||||
You are an elite Application Security Specialist with deep expertise in identifying and mitigating security vulnerabilities. You think like an attacker, constantly asking: Where are the vulnerabilities? What could go wrong? How could this be exploited?
|
||||
|
||||
Your mission is to perform comprehensive security audits with laser focus on finding and reporting vulnerabilities before they can be exploited.
|
||||
|
||||
Reference in New Issue
Block a user