Documentation Index
Fetch the complete documentation index at: https://docs.decepticon.red/llms.txt
Use this file to discover all available pages before exploring further.
Overview
Decepticon agents don’t operate from hardcoded playbooks. They draw from a skill system — a curated library of offensive techniques organized by kill chain phase and tagged with MITRE ATT&CK identifiers.Progressive Disclosure
Skills use a progressive loading architecture to keep agent context windows clean:- Initial load — Only skill frontmatter (name, description, ATT&CK tags, phase) is loaded
- On-demand — When an agent selects a skill, the full content is loaded via
read_file() - Clean context — Agents only carry the detail they need for their current objective
This prevents context bloat. An agent working on initial access doesn’t need the full content of lateral movement techniques — just their existence and metadata.
Skill Categories
Skills are organized by agent role, not by a single kill-chain dimension. This lets the orchestrator load only the skills relevant to the specialist it is dispatching, while still covering the full attack lifecycle. The library currently ships these categories:| Category | Owning Agent(s) | Coverage |
|---|---|---|
soundwave/ | Soundwave | RoE / ConOps / OPPLAN templates, threat profiles, deconfliction |
decepticon/ | Decepticon (orchestrator) | OPPLAN dispatch patterns, sub-agent routing |
recon/ | Recon | Passive recon, active recon, web recon, cloud recon, OSINT |
scanner/ | Scanner | Automated vulnerability scanning, CVE correlation |
exploit/ | Exploit | Web exploitation, Active Directory initial access |
exploiter/ | Exploiter | Reproducible PoC authoring |
detector/ | Detector | Sigma / YARA / heuristic detection-rule generation |
verifier/ | Verifier | Two-method verification gating |
patcher/ | Patcher | Patch generation and regression tests |
vulnresearch/ | Vulnresearch | Five-stage pipeline orchestration |
post-exploit/ | Post-Exploit | Privilege escalation, lateral movement, persistence |
ad/ | AD Operator | BloodHound, Kerberoasting, ticket forging, ACL abuse |
cloud/ | Cloud Hunter | IAM analysis, metadata abuse, cloud-key extraction |
contracts/ | Contract Auditor | Solidity static analysis, Foundry PoC harness |
reverser/ | Reverser | Binary triage, packer detection, ROP gadgets, Ghidra/radare2 |
analyst/ | Analyst | Cross-correlation, knowledge-graph queries, narrative drafting |
shared/ | All agents | OPSEC, defense evasion, finding protocol, deconfliction handshakes |
MITRE ATT&CK Integration
ATT&CK mapping is woven into every layer of Decepticon — not added after the fact:Objectives
Each OPPLAN objective carries
mitre technique IDs (e.g., T1190, T1003.001).Skills
ATT&CK techniques declared in skill frontmatter, displayed inline in the agent’s skill catalog.
Threat Actors
ConOps defines
initial_access and ttps as ATT&CK IDs, modeling specific adversary profiles.Skill Frontmatter Example
Each skill is a directory containing aSKILL.md (frontmatter + body) and optional references/, scripts/, and assets/ subdirectories.
Multi-Model Routing
Learn how different agent roles are routed to optimal model tiers.
