**CRITICAL**: Use this skill for ALL CVE remediation workflows. DO NOT use individual skills piecemeal for end-to-end remediation. Use when users request: - CVE remediation playbooks or security patch deployment - Multi-step remediation (validation → context → playbook → execution) - Batch remediation across multiple systems or CVEs - End-to-end CVE management (analysis + remediation + verification) - Prioritizing and remediating CVEs (not just listing them) - Emergency security response with immediate remediation plans DO NOT use for simple queries: - "List critical CVEs" → Use `/cve-impact` skill - "What's the CVSS score for CVE-X?" → Use `/cve-impact` or `/cve-validation` - Standalone impact analysis without remediation → Use `/cve-impact` This skill orchestrates 6 specialized skills (cve-impact, cve-validation, system-context, playbook-generator, playbook-executor, remediation-verifier) for complete remediation workflows.
89
85%
Does it follow best practices?
Impact
95%
2.71xAverage score across 3 eval scenarios
Passed
No known issues
End-to-end CVE remediation workflow. Orchestrates specialized skills for validation, context gathering, playbook generation, execution, and verification.
Required MCP Servers: lightspeed-mcp (CVE data, playbook generation), aap-mcp-job-management, aap-mcp-inventory-management (execution)
Related Skills (this skill invokes them):
/mcp-lightspeed-validator - Verify Lightspeed MCP before CVE operations/mcp-aap-validator - Verify AAP MCP before playbook execution/cve-impact - CVE risk assessment/cve-validation - CVE validation and remediation availability/system-context - System inventory and deployment context/playbook-generator - Ansible playbook generation/playbook-executor - Playbook execution via AAP/remediation-verifier - Post-remediation verificationVerification: See Step 0 for MCP validation. Execute /mcp-aap-validator before Step 5 (playbook execution) if not already validated.
Use this skill when:
Do NOT use when:
/cve-impact/cve-validation/playbook-generator directlyExecute skills in this order. MANDATORY: Use actual Skill tool invocations, NOT text pretending to invoke skills. Each step must complete before the next begins—do not start Step N+1 until Step N has returned its result.
When: Before executing any step. Do NOT start Step 0 until the user validates the plan.
Action: Present the planned task list using Part A of references/01-remediation-plan-template.md. Show the 7 tasks (validate MCP → impact → validate CVE → context → playbook → execute → verify) and ask "Proceed with this plan?"
Task list ordering (CRITICAL): If using TodoWrite or task list UI, create tasks in workflow order (Step 0, 1, 2, 3, 4, 5, 6). Do NOT create in completion order or random order—display order must match execution order.
Wait for explicit user response ("yes" or "proceed") before invoking Step 0. If "abort" → stop.
Action: Execute /mcp-lightspeed-validator (and /mcp-aap-validator before Step 5 if executing playbooks)
When: Before any CVE or remediation operations. Can skip if already validated this session.
Sequencing (MANDATORY): Invoke validators one at a time. Do NOT proceed to Step 1 until Step 0 is complete. Wait for each validator to return explicit results (PASSED / FAILED / PARTIAL) before moving on. "Successfully loaded skill" alone does NOT mean validation completed—you must see the actual validation outcome.
Invocation: Use the Skill tool for ALL sub-skill invocations (validators, cve-validation, cve-impact, system-context, playbook-generator, playbook-executor, remediation-verifier). Do NOT use "Task Output" with the skill name as task ID—that causes "No task found" errors (e.g. "No task found with ID: cve-validation"). See skill-invocation.md.
Handle result: If validation fails, stop and provide setup instructions. If passed, proceed to Step 1. If any skill invocation fails (e.g. "No task found with ID: ..."): Proceed with a warning—do not block. Later steps will surface real errors if MCP is unavailable.
Action: Execute the /cve-impact skill
Invoke:
"Analyze CVE-XXXX-YYYY and assess its impact on affected systems"Expected: Risk assessment, affected systems list, CVSS interpretation. Integrate into remediation planning. If user only wanted impact analysis, provide assessment and offer remediation options.
Action: Execute the /cve-validation skill
Invoke:
"Validate CVE-XXXX-YYYY format, existence, and remediation availability"Expected: Validation status including remediation_status.automated_remediation_available or validation_status.
Remediatable Gate (MANDATORY): Trust cve-validation skill output. Do NOT re-interpret raw get_cve response—cve-validation uses advisory_available, remediation, advisories_list (not rules[]). See cve-validation references/01-remediation-indicators.md.
remediation_available: true or validation_status: "valid"): Proceed to Step 3.remediation_available: false or validation_status: "not_remediable"):
Batch: For multiple CVEs, validate each. Proceed only with remediatable CVEs unless user explicitly confirms to include non-remediatable ones (with same warning).
Action: Execute the /system-context skill
Invoke:
"Gather system context for CVE-XXXX-YYYY: identify affected systems, RHEL versions, and deployment environments"Expected: Context summary with remediation strategy. Use to inform playbook generation and execution planning.
Action: Execute the /playbook-generator skill
CRITICAL: You MUST invoke /playbook-generator, NOT generate playbook text yourself.
Invoke:
"Generate an Ansible remediation playbook for CVE-XXXX-YYYY targeting systems [list of system UUIDs]. Apply Red Hat best practices and RHEL-specific patterns from documentation."Expected: Ansible playbook from Red Hat Lightspeed (returned AS IS by playbook-generator—no modifications). Present to user. The playbook-generator ONLY GENERATES—it does NOT execute. After presenting the playbook, present the Remediation Plan for user validation (see below).
When: After Step 4 completes. Do NOT proceed to Step 5 until the user validates the plan.
Action: Present the plan using the Summary + Table + Checklist format. Read references/01-remediation-plan-template.md for the exact template.
Format:
Wait for explicit user response. If "yes" or "proceed" → invoke playbook-executor. If "abort" → stop. If "dry-run only" → invoke playbook-executor with instruction to run dry-run only and stop.
Prerequisite: Remediation Plan must be presented and user must have responded "yes" or "proceed" (or "dry-run only"). Do NOT invoke playbook-executor until plan validation is complete.
CRITICAL: Before execution, you MUST:
Action: Execute the /playbook-executor skill
Invoke (pass playbook metadata from playbook-generator and system-context):
"Execute the generated playbook for CVE-XXXX-YYYY. Playbook file: [filename from playbook-generator]. Content: [in context from playbook-generator output]. Target systems: [list of system UUIDs from system-context]. Start with dry-run (check mode) if user requested it. Monitor job status until completion and report results."Git Flow path: When playbook-executor performs Git Flow (write playbook to repo), it MUST use the absolute path for the Write tool: <user_provided_repo_path>/playbooks/remediation/<filename>. Never use a relative path like test-aap-project/playbooks/...—that causes "Error writing file" when the repo is outside the workspace.
Expected: playbook-executor validates AAP, matches templates, offers dry-run, executes on approval, streams progress, generates report. Validates job log for CVE handling—confirms from stdout that the playbook addressed the target CVE(s); reports ✓ confirmation or ⚠️ warning if no evidence found. After success, suggest verification with /remediation-verifier.
Action: Execute the /remediation-verifier skill (if user requests verification)
Invoke:
"Verify remediation success for CVE-XXXX-YYYY on systems [list of system UUIDs]. Check CVE status, package versions, and service health."Expected: Verification report with pass/fail. Present results to user.
lightspeed-mcp - CVE data, playbook generationaap-mcp-job-management - Job launch and monitoringaap-mcp-inventory-management - Inventory for executioncve-impact - Step 1cve-validation - Step 2system-context - Step 3playbook-generator - Step 4playbook-executor - Step 5remediation-verifier - Step 6This skill requires explicit user confirmation at:
Upfront Planned Tasks (before Step 0)
Remediation Plan Validation (before Step 5)
Before Playbook Execution (Step 5)
Before Destructive Actions
Never assume approval—always wait for explicit user confirmation before execution.
vulnerability__explain_cves: Requires a valid system_uuid from inventory. Do NOT call it unless you have the resolved UUID from Step 3 (system-context) or Step 1 (cve-impact). Never pass system_uuid: "undefined" or placeholder values—this causes validation errors. For remediation availability at Step 2, use get_cve via cve-validation only.
Lightspeed tool failures: If a tool fails with a cryptic backend error (e.g. 'dnf_modules'), do NOT retry or expose the raw error. Use workarounds from lightspeed-mcp-tool-failures.md.
'dnf_modules'): Do NOT show raw error. Use user-friendly message and workaround from lightspeed-mcp-tool-failures.md.Single CVE:
CVE-XXXX-YYYY Remediation Summary
CVSS Score: X.X (Severity)
Affected Packages: package-name-version
Ansible Playbook Generated: ✓
Target Systems: N systems
[Playbook YAML or AAP link]
[Execution instructions]Batch:
Batch Remediation Summary
CVEs: CVE-A, CVE-B, CVE-C
Target Systems: N systems
Total Fixes: X package updates
[Consolidated playbook]
[Execution instructions]600eabe
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.