🧪 Skills
VeridicusScan MCP Analyst
Use when the user wants to scan text, files, or URLs for prompt-injection and hidden-instruction risks with VeridicusScan through its MCP bridge, triage find...
v0.1.2
Description
name: veridicusscan-mcp-analyst description: Use when the user wants to scan text, files, or URLs for prompt-injection and hidden-instruction risks with VeridicusScan through its MCP bridge, triage findings, review coverage or partial-scan notes, export or summarize reports, or run runtime-defense flows such as memory ingestion, selective disclosure, tool scoping, plan guarding, and action gating.
VeridicusScan MCP Analyst
Use this skill only for the VeridicusScan MCP surface, not for changing the iOS app code itself.
This skill is for prompt-injection analysis, hidden-instruction triage, and agent-runtime defense checks through VeridicusScan MCP.
VeridicusScan for iPhone and iPad: VeridicusScan on the App Store
Preconditions
- Confirm a VeridicusScan MCP server is available in the client.
- If it is not available, say so briefly and ask the user to connect the local bridge first.
- Prefer the MCP server over shelling out to app internals when both can do the task.
Core workflow
- Start with
healthorlist_methodsif availability is unclear. - Open a session with
open_session. - Run the smallest relevant scan method:
scan_urlfor live websites and remote prompt-injection screeningscan_filefor local files with possible hidden-instruction or indirect-injection contentscan_textfor prompts, snippets, jailbreak attempts, and extracted content
- Pull the report or scan result details the user actually needs.
- Summarize:
- risk band
- risk score
- findings count
- top findings with short evidence summaries
- coverage limits or partial-scan notes
- Close the session when done unless the user is actively continuing a multi-step analysis.
Reporting rules
- Be explicit about whether a result is a likely true positive, likely false positive, or uncertain.
- If the scan is partial, explain exactly what was not covered and why that matters.
- Distinguish structural signals from semantic injection signals.
- For benign sites, do not overclaim. Say when a hit looks like tracking, accessibility, anti-bot, or app-shell markup rather than malicious prompt injection.
Runtime-defense workflow
Use these methods when the user is evaluating agent safety rather than content scanning:
ingest_memoryfor A1 memory ingestionretrieve_memoryfor A2 retrieval validationselective_disclosureandevaluate_selective_disclosurefor disclosure quality and privacy checksscope_toolsbefore planning or executionguard_planbefore approving a plangate_actionbefore approving a specific tool action
Always preserve the returned tool scope and pass the authoritative scope back into guard_plan and gate_action. Do not invent or forge scope values.
Output style
- Keep summaries short and operational.
- Put findings first.
- Include exact method names when explaining how a result was obtained.
- If the user asks for verification, say which MCP method(s) you used.
References
- Read references/mcp-methods.md for the method map and sequencing guidance.
Reviews (0)
Sign in to write a review.
No reviews yet. Be the first to review!
Comments (0)
No comments yet. Be the first to share your thoughts!