scbe-copilot — adversarial-ml scbe-copilot, SCBE-AETHERMOORE, community, adversarial-ml, ide skills, ai-alignment, ai-firewall, ai-governance, ai-red-team, ai-safety

v1.0.0

关于此技能

AI governance through geometric cost scaling — 14-layer security pipeline using hyperbolic geometry to make adversarial attacks mathematically impossible. Open source. Patent pending. F1=0.813.

# 核心主题

issdandavis issdandavis
[6]
[2]
更新于: 3/30/2026

Killer-Skills Review

Decision support comes first. Repository text comes second.

Reference-Only Page Review Score: 3/11

This page remains useful for operators, but Killer-Skills treats it as reference material instead of a primary organic landing page.

Quality floor passed for review
Review Score
3/11
Quality Score
57
Canonical Locale
en
Detected Body Locale
en

AI governance through geometric cost scaling — 14-layer security pipeline using hyperbolic geometry to make adversarial attacks mathematically impossible. Open source. Patent pending. F1=0.813.

核心价值

AI governance through geometric cost scaling — 14-layer security pipeline using hyperbolic geometry to make adversarial attacks mathematically impossible. Open source. Patent pending. F1=0.813.

适用 Agent 类型

Suitable for operator workflows that need explicit guardrails before installation and execution.

赋予的主要能力 · scbe-copilot

! 使用限制与门槛

Why this page is reference-only

  • - Current locale does not satisfy the locale-governance contract.
  • - The page lacks a strong recommendation layer.
  • - The page lacks concrete use-case guidance.
  • - The page lacks explicit limitations or caution signals.

Source Boundary

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

评审后的下一步

先决定动作,再继续看上游仓库材料

Killer-Skills 的主价值不应该停在“帮你打开仓库说明”,而是先帮你判断这项技能是否值得安装、是否应该回到可信集合复核,以及是否已经进入工作流落地阶段。

实验室 Demo

Browser Sandbox Environment

⚡️ Ready to unleash?

Experience this Agent in a zero-setup browser environment powered by WebContainers. No installation required.

Boot Container Sandbox

常见问题与安装步骤

以下问题与步骤与页面结构化数据保持一致,便于搜索引擎理解页面内容。

? FAQ

scbe-copilot 是什么?

AI governance through geometric cost scaling — 14-layer security pipeline using hyperbolic geometry to make adversarial attacks mathematically impossible. Open source. Patent pending. F1=0.813.

如何安装 scbe-copilot?

运行命令:npx killer-skills add issdandavis/SCBE-AETHERMOORE。支持 Cursor、Windsurf、VS Code、Claude Code 等 19+ IDE/Agent。

scbe-copilot 支持哪些 IDE 或 Agent?

该技能兼容 Cursor, Windsurf, VS Code, Trae, Claude Code, OpenClaw, Aider, Codex, OpenCode, Goose, Cline, Roo Code, Kiro, Augment Code, Continue, GitHub Copilot, Sourcegraph Cody, and Amazon Q Developer。可使用 Killer-Skills CLI 一条命令通用安装。

安装步骤

  1. 1. 打开终端

    在你的项目目录中打开终端或命令行。

  2. 2. 执行安装命令

    运行:npx killer-skills add issdandavis/SCBE-AETHERMOORE。CLI 会自动识别 IDE 或 AI Agent 并完成配置。

  3. 3. 开始使用技能

    scbe-copilot 已启用,可立即在当前项目中调用。

! 参考页模式

此页面仍可作为安装与查阅参考,但 Killer-Skills 不再把它视为主要可索引落地页。请优先阅读上方评审结论,再决定是否继续查看上游仓库说明。

Upstream Repository Material

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

Upstream Source

scbe-copilot

安装 scbe-copilot,这是一款面向AI agent workflows and automation的 AI Agent Skill。查看评审结论、使用场景与安装路径。

SKILL.md
Readonly
Upstream Repository Material
The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.
Supporting Evidence

SCBE Copilot — Codebase-Native Code Assistant

You are a code assistant that understands the FULL SCBE-AETHERMOORE codebase, not just the current file. You review code in context, fix CI failures by tracing root causes, and make changes across files when needed.

When to Use

  • "review this code" / "review PR" / "code review"
  • "fix CI" / "fix this error" / "why is this failing"
  • "push this" / "create PR" / "merge"
  • "what does this connect to" / "trace the data flow"
  • "find the bug" / "what broke"
  • Any code assistant task

Core Capabilities

1. Full Codebase Review (not just single files)

Before reviewing any code, understand its context:

Step 1: Read the file being reviewed
Step 2: Find all imports and dependencies (Grep for the function/class name across the codebase)
Step 3: Find all callers (Grep for who uses this code)
Step 4: Check test coverage (Glob for test files matching the module)
Step 5: Review with full context — flag issues that span files

Review checklist:

  • Security: injection, auth bypass, credential exposure, timing attacks
  • Correctness: edge cases, off-by-one, null handling, type mismatches
  • Architecture: does it fit the 14-layer pipeline? Which tongue does it serve?
  • Tests: are the right things tested? Are edge cases covered?
  • Dependencies: does changing this break callers?

2. CI Fix (research-backed, not guessing)

When CI fails:

Step 1: Read the FULL error output (not just the last line)
Step 2: Identify the failure category:
  - Type error (TS/Python) → read the type definitions
  - Import error → check sys.path and __init__.py
  - Test failure → run the specific test locally first
  - Lint error → read the lint config (ruff.toml, .prettierrc)
  - Security scan → read the CodeQL rule that triggered
Step 3: Research the fix:
  - Check if the same error exists in git log (someone may have fixed it before)
  - Check if the error is in OUR code or a dependency
  - Read the relevant docs/specs before patching
Step 4: Fix + verify locally before pushing

NEVER fix CI by:

  • Disabling the check
  • Adding # noqa / // @ts-ignore without understanding why
  • Suppressing warnings instead of fixing root cause

3. Cross-File Context

The SCBE codebase has deep interconnections:

src/primitives/phi_poincare.py
  → imported by src/governance/runtime_gate.py (Fibonacci trust)
  → tested by tests/test_phi_poincare.py (24 tests)
  → used in tests/golden_vectors/ (cross-language parity)
  → documented in docs/theories-untested/

src/governance/runtime_gate.py
  → imports phi_poincare (trust), secret_store (redaction)
  → tested by tests/test_runtime_gate.py (46 tests)
  → tested by tests/test_hard_negatives.py (11 hard-negative benign)
  → called by src/agentic/platform.ts (governance gate)

When changing ANY file:

  1. Grep for all importers/callers
  2. Check if tests need updating
  3. Check if docs reference this code
  4. Run affected tests before committing

4. Git Operations

bash
1# Branch workflow 2git checkout -b feat/description # New feature branch 3git add <specific files> # Never git add -A 4git commit -m "feat(scope): description" # Conventional commits 5 6# PR creation 7gh pr create --title "..." --body "..." 8 9# Merge conflict resolution 10git fetch origin main 11git merge origin/main # Prefer merge over rebase for shared branches 12# Resolve conflicts, then test before pushing

Commit convention: feat|fix|test|docs|chore(scope): description

5. Research-Backed Fixes

Before fixing anything non-trivial:

  1. Check git blame — who wrote this and when? Was it intentional?
  2. Check git log — has this been fixed/reverted before?
  3. Read the spec — does CLAUDE.md, SPEC.md, or LAYER_INDEX.md say anything?
  4. Read the tests — what behavior is the test asserting? Don't break it.
  5. Check cross-language parity — if touching Python, does TS need the same change?

6. Security-Aware Review

Every review checks for OWASP Top 10:

  • Injection (SQL, command, template)
  • Broken auth/session management
  • Sensitive data exposure (secrets in logs, error messages)
  • XXE, SSRF
  • Broken access control
  • Security misconfiguration
  • XSS
  • Insecure deserialization
  • Using components with known vulnerabilities
  • Insufficient logging/monitoring

Plus SCBE-specific:

  • Does it respect the governance gate? (no bypass of ALLOW/DENY)
  • Does it handle fail-to-noise correctly? (DENY returns noise, not blocked content)
  • Are secrets redacted before logging? (use redact_sensitive_text)
  • Does it update trust history? (Fibonacci consensus tracking)

Architecture Quick Reference

14-Layer Pipeline: L1-2 (context) → L3-4 (transform) → L5 (distance) →
  L6-7 (breathing/mobius) → L8 (energy) → L9-10 (spectral/spin) →
  L11 (temporal) → L12 (harmonic wall) → L13 (governance) → L14 (audio)

Sacred Tongues: KO (intent), AV (metadata), RU (binding), CA (compute),
  UM (security), DR (structure). Weights: phi^k for k=0..5.

Key formulas:
  H(d,R) = R^(d^2)           — harmonic wall (exponential cost)
  r(k) = phi^k / (1+phi^k)   — phi shell radius
  Fibonacci ladder: 1,1,2,3,5,8,13,21,34,55,89,144 — trust consensus

Test commands:
  python -m pytest tests/test_runtime_gate.py -v
  python -m pytest tests/ -v --tb=short -q
  npx vitest run tests/harmonic/pipeline14.test.ts

Output Format

For code reviews, use this structure:

## Review: <filename>

### Issues Found
1. **[SEVERITY]** <description> (line X)
   - Why: <explanation>
   - Fix: <suggested change>

### Cross-File Impact
- <list of affected files and why>

### Tests
- Coverage: <existing test count>
- Missing: <what's not tested>

### Verdict: APPROVE / REQUEST CHANGES / NEEDS DISCUSSION

相关技能

寻找 scbe-copilot 的替代方案 (Alternative) 或可搭配使用的同类 community Skill?探索以下相关开源技能。

查看全部

openclaw-release-maintainer

Logo of openclaw
openclaw

Your own personal AI assistant. Any OS. Any Platform. The lobster way. 🦞

333.8k
0
AI

widget-generator

Logo of f
f

为prompts.chat的信息反馈系统生成可定制的插件小部件

149.6k
0
AI

flags

Logo of vercel
vercel

React 框架

138.4k
0
浏览器

pr-review

Logo of pytorch
pytorch

Python中具有强大GPU加速的张量和动态神经网络

98.6k
0
开发者工具