II.
LibraryAgent overview
Reference · livelib-agent:security-research--security-report-writer
Security Report Writer Agent overview
Professional security documentation and report writing specialist
Attributes
displayName
Security Report Writer Agent
description
Professional security documentation and report writing specialist
libraryPath
library/specializations/security-research/agents/security-report-writer/AGENT.md
specialization
security-research
role
Security Documentation Specialist
expertise
- Vulnerability report writing
- CVE and advisory documentation
- Bug bounty report optimization
- Executive summary creation
- Technical writing for security
- CVSS scoring and risk assessment
Outgoing edges
lib_applies_to_domain1
- domain:cybersecurity·DomainCybersecurity
lib_belongs_to_specialization1
- specialization:security-research·Specialization
lib_implements_workflow2
- workflow:vulnerability-management·Workflow
- workflow:penetration-testing-cycle·WorkflowPenetration Testing Cycle
lib_involves_role1
- role:security-engineer·RoleSecurity Engineer
lib_requires_skill_area2
- skill-area:vulnerability-management·SkillAreaVulnerability Management
- skill-area:compliance-automation·SkillAreaCompliance Automation
Incoming edges
uses_agent29
- lib-process:security-research--ai-ml-security-research·LibraryProcessai-ml-security-research
- lib-process:security-research--api-security-research·LibraryProcessapi-security-research
- lib-process:security-research--binary-reverse-engineering·LibraryProcessbinary-reverse-engineering
- lib-process:security-research--bug-bounty-workflow·LibraryProcessbug-bounty-workflow
- lib-process:security-research--cloud-security-research·LibraryProcesscloud-security-research
- lib-process:security-research--container-security-research·LibraryProcesscontainer-security-research
- lib-process:security-research--dynamic-analysis-runtime-testing·LibraryProcessdynamic-analysis-runtime-testing
- lib-process:security-research--exploit-development·LibraryProcessexploit-development
- lib-process:security-research--firmware-analysis·LibraryProcessfirmware-analysis
- lib-process:security-research--fuzzing-campaign·LibraryProcessfuzzing-campaign
- lib-process:security-research--hardware-security-research·LibraryProcesshardware-security-research
- lib-process:security-research--malware-analysis·LibraryProcessmalware-analysis
- lib-process:security-research--mobile-app-security-research·LibraryProcessmobile-app-security-research
- lib-process:security-research--network-penetration-testing·LibraryProcessnetwork-penetration-testing
- lib-process:security-research--protocol-reverse-engineering·LibraryProcessprotocol-reverse-engineering
- lib-process:security-research--purple-team-exercise·LibraryProcesspurple-team-exercise
- lib-process:security-research--red-team-operations·LibraryProcessred-team-operations
- lib-process:security-research--responsible-disclosure·LibraryProcessresponsible-disclosure
- lib-process:security-research--security-advisory-writing·LibraryProcesssecurity-advisory-writing
- lib-process:security-research--security-research-publication·LibraryProcesssecurity-research-publication
- lib-process:security-research--security-tool-development·LibraryProcesssecurity-tool-development
- lib-process:security-research--shellcode-development·LibraryProcessshellcode-development
- lib-process:security-research--smart-contract-auditing·LibraryProcesssmart-contract-auditing
- lib-process:security-research--static-code-analysis·LibraryProcessstatic-code-analysis
- lib-process:security-research--supply-chain-security·LibraryProcesssupply-chain-security
- lib-process:security-research--variant-analysis·LibraryProcessvariant-analysis
- lib-process:security-research--vulnerability-research-workflow·LibraryProcessvulnerability-research-workflow
- lib-process:security-research--vulnerability-root-cause-analysis·LibraryProcessvulnerability-root-cause-analysis
- lib-process:security-research--web-app-vuln-research·LibraryProcessweb-app-vuln-research