Audit and maintain attack protocol definitions for implementability, coverage, reproducibility, and fair comparison. Use when users ask for attack protocol review, attack family validation, protocol schema checks, or multi-attack evaluation integrity.