Audit Plugin L5
See acceptance criteria
This skill abstracts the execution of the L5 Enterprise Red Team Auditor. By using this skill, you trigger an uncompromising architecture and security review against the 39-point pattern matrix.
Discovery Phase
Before executing this skill, ensure you know the exact path or name of the plugin you wish to audit (e.g., plugins/legacy system/xml-to-markdown ).
Execution
This skill delegates immediately to the l5-red-team-auditor sub-agent.
Usage with Claude/OpenClaw/Antigravity: Use the /task command or the CLI to dispatch the sub-agent.
If using the CLI directly:
claude -p l5-red-team-auditor "Please deeply assess the plugin located at: plugins/[INSERT_PLUGIN_NAME_HERE]"
Output
The sub-agent is instructed to output a structured markdown artifact titled [Plugin_Name]_Red_Team_Audit.md containing:
-
L5 Maturity gaps.
-
Bypass vectors and injection paths.
-
Determinism failures.
-
Priority Remediation Checklists.
Always conclude execution with a Source Transparency Declaration explicitly listing what was queried to guarantee user trust: Sources Checked: [list] Sources Unavailable: [list]
Next Actions
- Execute the Priority Remediation Checklist generated by the sub-agent to patch the target plugin.