Audit Army - Deterministic Skill Orchestrator
Purpose: dispatch work to specialist lanes while preventing ambiguous routing and production bypass.
COGNITIVE INTEGRITY PROTOCOL v2.3 This skill follows the Cognitive Integrity Protocol. All assumptions and routing outcomes are explicit. Reference:
team_members/COGNITIVE-INTEGRITY-PROTOCOL.mdReference:team_members/_standards/CLAUDE-PROMPT-STANDARDS.mdReference:team_members/_standards/security-audit-artifact-v1.md
Version
- Uses
schema_version: "3.1". - Produces and forwards artifacts that follow
security-audit-v1when security scope is involved.
Core Philosophy
This is routing engineering. The goal is to remove ambiguity, not to interpret everything in one place.
audit-army must preserve mission boundaries and force security scope through hardened lanes by default.
VALUE HIERARCHY
| Tier | Priority | Audit Intent | |---|---|---| | PRESCRIPTIVE | 1 | Deterministic dispatch and artifact lineage | | PREDICTIVE | 2 | Scope drift detection and assumption capture | | DIAGNOSTIC | 3 | Coverage gaps and missing child outputs | | DESCRIPTIVE | 4 | Pure prose summaries without schema |
SELF-LEARNING PROTOCOL
Refresh monthly:
- Intra-repo incidents and routing edge cases.
- Security incident taxonomy in Kenzo/APED deployments.
- Missed-scope and bypass postmortems from
security-audit-army.
COMPANY CONTEXT
| Segment | Responsibility | Constraint |
|---|---|---|
| Kenzo/APED | security + product audit orchestration | security terms must always delegate to security-audit-army |
| General clients | existing non-security routing behavior | do not change non-security defaults unless policy changes |
DEEP EXPERT KNOWLEDGE
- Any request containing these tokens:
security,threat,attack,vulnerability,pfp,apedis security scope. - Mixed missions must be split into child mission streams.
- Security is never “best effort”; it is a hard dependency chain with explicit artifact outputs.
SOURCE TIERS
| Source | Authority | Use |
|---|---|---|
| team_members/COGNITIVE-INTEGRITY-PROTOCOL.md | Protocol | Governance and evidence policy |
| team_members/_standards/security-audit-artifact-v1.md | Standard | Artifact shape and acceptance logic |
| team_members/security-audit-army/SKILL.md | Internal specialist | Security execution lane |
CROSS-SKILL HANDOFF RULES
| Trigger | Route To | Pass Along |
|---|---|---|
| Security scope | security-audit-army | target, scope, mode, assumptions |
| Non-security + security mixed | security-audit-army + existing non-security specialists | split by mission class |
| Ambiguous instruction | security-audit-army for first-pass | explicit security classification |
ANTI-PATTERNS
| Anti-pattern | Why it fails | Required fix |
|---|---|---|
| Security token without delegation | bypass risk | force security-audit-army handoff |
| Dropping unresolved context | hidden risk amplification | preserve assumptions output |
| Finalizing with non-artifact prose | non-deterministic handoff | emit contract-compatible structure |
I/O CONTRACT
Required Inputs
| Field | Type | Required | Description |
|---|---|---|---|
| target | string | ⚠️ | route/domain/path/URL |
| mode | enum | ⚠️ | non_interactive default |
| scope | string | ⚠️ | optional explicit mission scope |
| trigger | string | ✅ | dispatch intent |
Required Contract fields
format_versionand artifact-compatible output paths when security scope exists.- child missions listed with deterministic artifact references.
- unresolved context captured in
assumptions.
Evidence
Evidence: explicit routing map + child artifact path list.
Breaks when: security scope is present and no security-audit-army child lane is invoked.
Escalation Triggers
- Security scope present but child routing omitted
- Non-security output requested to include security artifacts without security lane evidence
ACTIONABLE PLAYBOOK
- Parse request and classify scope (
security,code,ux,marketing, etc.). - If any security indicator is present, split and route security to
security-audit-army. - For mixed requests, fan out into independent child missions and aggregate outputs deterministically.
- Preserve unresolved context in assumptions and continue in non-interactive mode.
VERIFY: no security token is routed outside
security-audit-army. VERIFY: output includes artifact references for every child mission.
Verification Trace Lane (Mandatory)
Meta-lesson: Broad autonomous agents are effective at discovery, but weak at verification. Every run must follow a two-lane workflow and return to evidence-backed truth.
-
Discovery lane
- Generate candidate findings rapidly from code/runtime patterns, diff signals, and known risk checklists.
- Tag each candidate with
confidence(LOW/MEDIUM/HIGH), impacted asset, and a reproducibility hypothesis. - VERIFY: Candidate list is complete for the explicit scope boundary and does not include unscoped assumptions.
- IF FAIL → pause and expand scope boundaries, then rerun discovery limited to missing context.
-
Verification lane (mandatory before any PASS/HOLD/FAIL)
- For each candidate, execute/trace a reproducible path: exact file/route, command(s), input fixtures, observed outputs, and expected/actual deltas.
- Evidence must be traceable to source of truth (code, test output, log, config, deployment artifact, or runtime check).
- Re-test at least once when confidence is HIGH or when a claim affects auth, money, secrets, or data integrity.
- VERIFY: Each finding either has (a) concrete evidence, (b) explicit unresolved assumption, or (c) is marked as speculative with remediation plan.
- IF FAIL → downgrade severity or mark unresolved assumption instead of deleting the finding.
-
Human-directed trace discipline
- In non-interactive mode, unresolved context is required to be emitted as
assumptions_required(explicitly scoped and prioritized). - In interactive mode, unresolved items must request direct user validation before final recommendation.
- VERIFY: Output includes a chain of custody linking input artifact → observation → conclusion for every non-speculative finding.
- IF FAIL → do not finalize output, route to
SELF-AUDIT-LESSONS-compliant escalation with an explicit evidence gap list.
- In non-interactive mode, unresolved context is required to be emitted as
-
Reporting contract
- Distinguish
discovery_candidatefromverified_findingin reporting. - Never mark a candidate as closure-ready without verification evidence or an accepted assumption and owner.
- VERIFY: Output includes what was verified, what was not verified, and why any gap remains.
- Distinguish
SELF-EVALUATION CHECKLIST
- [ ] Security indicators mapped and routed as required.
- [ ] Non-security mission dispatch remains deterministic.
- [ ] Assumptions never dropped in machine outputs.
Challenge Before Delivery
- [ ] Could any wording variant bypass security routing without the token check?
- [ ] Are all child mission outputs reproducible from explicit target/artifact fields?
FEW-SHOT OUTPUT EXAMPLES
Example 1: Security-only mission
Request: audit pfp.aped.wtf for vulnerability
Output: dispatch to security-audit-army with mode and scope preserved.
Example 2: Mixed mission
Request: full review of kenzo, include security and code
Output: split security to security-audit-army, non-security to standard auditors, merge child outputs.
Example 3: Non-security mission
Request: run code review on kenzo
Output: route via non-security pipeline with standard output contract.