Pack K — Security + Compliance

A curated set of agents with a shared permission & risk profile.

Pack permissions

No special permissions

Quickstart

  • Download the pack bundle.
  • Unzip it locally and review pack.json + each agent stub.
  • Use the Local Runner to install (demo) packs, then run agents against demo targets.

Agents in this pack

Audio Spectrogram Agent (Signal Processing)

Analyzes an audio file and generates a visual heatmap (Spectrogram) of frequencies over time. Essential for audio engineering and forensics.

spec No permissions

Blockchain Miner Agent (Crypto)

Demonstrates the core mechanism of Bitcoin (Proof-of-Work). It tries millions of random "nonces" until it finds a SHA256 hash that starts with a specific number of zeros (difficulty).

spec No permissions

DNS Digger Agent (Network Intel)

Performs a deep dive into a domain's DNS records, retrieving A, AAAA, MX, TXT, and NS records. Useful for debugging email issues or verification tokens.

spec No permissions

Exif Metadata Spy (Forensics)

Extracts hidden metadata from images (GPS coordinates, Camera Model, Shutter Speed, Date Taken). Useful for verifying the origin of an image.

spec No permissions

File Date Spoofer (Forensics)

Modifies the "Created", "Modified", and "Accessed" timestamps of a file to any date in the past or future. Used to hide when a file was actually touched.

spec No permissions

File Encryptor Agent (Security)

Encrypts (and Decrypts) any file using AES-256-CTR. Protects sensitive documents before sharing or storage.

spec No permissions

File Integrity Monitor (Compliance)

Calculates SHA-256 hashes of all files in a directory and compares them to a "known good" baseline to detect unauthorized changes (e.g., malware or tampering).

spec No permissions

JWT Token Generator (Auth Utility)

Creates valid, cryptographically signed JSON Web Tokens (JWTs) using HMAC SHA256. Useful for testing APIs that require authentication headers without needing a full login flow.

spec No permissions

Network Port Scanner

Security / Diagnostic tool. It scans a target host (localhost or IP) for open ports to ensure services are running (or to find unauthorized listeners).

spec No permissions

Password Auditor (Security)

Analyzes a password string for strength, calculates entropy, and estimates the time it would take to crack it via brute force.

spec No permissions

Ransomware Canary (Defense)

Creates a hidden "honey pot" file and watches it. If any process modifies or deletes this file (typical ransomware behavior), it triggers an alert.

spec No permissions

Secure File Shredder (Privacy)

Permanently destroys a file by overwriting it with 0s, 1s, and random bytes before deleting. Makes forensic recovery nearly impossible.

spec No permissions

SEO Auditor Agent (Marketing)

Crawls a URL and checks for critical SEO tags (Title, Description, H1, Alt Tags) and performance indicators. Generates a "Scorecard."

spec No permissions

SSL Certificate Checker (Network Security)

Connects to a domain via TLS, retrieves the certificate chain, and calculates days until expiration. Essential for uptime monitoring.

spec No permissions

Subdomain Enumerator (Recon)

Uses a dictionary attack to find active subdomains (e.g., admin.site.com, mail.site.com) by resolving them against DNS.

spec No permissions

Token Counter Agent (Cost Estimator)

Calculates the number of tokens in a string using gpt-3-encoder. Essential for estimating LLM costs and ensuring prompts fit within context windows.

spec No permissions

TOTP Authenticator (Security)

Generates Time-based One-Time Passwords (like Google Authenticator) for a given 2FA secret. Useful for automating logins that require 2FA.

spec No permissions

Whois Agent (Network Intel)

Queries WHOIS servers to find domain registration details (Registrar, Creation Date, Expiry). Useful for domain research.

spec No permissions