github.com/dandye/ai-runbooks
Skill | Added | Review |
|---|---|---|
triage-suspicious-login Triage suspicious login alerts like impossible travel, untrusted location, or multiple failures. Use when investigating authentication anomalies. Analyzes user history, source IP reputation, login patterns, and determines if escalation is needed. | 88 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
triage-malware Triage a suspected malicious file hash. Use when investigating malware alerts or suspicious files. Analyzes GTI file report, behavioral indicators, identifies affected hosts, enriches network IOCs, and recommends containment actions. | 96 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
triage-alert Triage a security alert or case. Use when given an ALERT_ID or CASE_ID to assess if it's a real threat. Enriches IOCs, searches SIEM for context, and determines if the alert should be closed (false positive) or escalated for investigation. | 99 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
respond-ransomware Respond to a ransomware incident following PICERL methodology. Use when ransomware is detected or suspected. Orchestrates identification, containment, eradication, and recovery phases. Requires CASE_ID and initial indicators. | 83 Impact Pending No eval scenarios have been run Securityby Advisory Suggest reviewing before use Reviewed: Version: 4d132c7 | |
respond-phishing Respond to a reported phishing email following PICERL methodology. Use when a phishing email is reported or detected. Analyzes artifacts, identifies recipients who clicked, contains malicious IOCs, and removes emails from mailboxes. | 81 Impact Pending No eval scenarios have been run Securityby Advisory Suggest reviewing before use Reviewed: Version: 4d132c7 | |
respond-malware Respond to a malware incident following PICERL methodology. Use when malware is detected on endpoints. Orchestrates triage, containment, eradication, and recovery. Works with triage-malware skill for analysis. | 73 Impact Pending No eval scenarios have been run Securityby Advisory Suggest reviewing before use Reviewed: Version: 4d132c7 | |
respond-compromised-account Respond to a potentially compromised user account. Use when impossible travel, credential stuffing, successful phishing, or suspicious activity indicates account compromise. Investigates activity, contains the account, removes persistence, and restores access. | 96 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
pivot-on-ioc Explore GTI relationships for an IOC to discover related entities. Use to expand investigation by finding connected domains, IPs, files, or threat actors. Takes an IOC and relationship types to query. | 88 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
inventory-content Systematic cataloging of information assets. Creates comprehensive inventories of all content with metadata and characteristics. | 40 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
hunt-threat Conduct proactive, hypothesis-driven threat hunting. Use when performing advanced hunting based on threat intelligence, TTPs, or anomalies. For Tier 3 analysts or dedicated threat hunters. Supports iterative search, pivoting, and comprehensive documentation. | 75 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
hunt-lateral-movement Hunt for lateral movement using PsExec, WMI, or similar techniques. Use when proactively searching for attackers moving through your network using admin tools. Searches for service installations, remote process execution, and suspicious network correlations. | 95 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
hunt-ioc Hunt for specific IOCs across your environment. Use when you have a list of IPs, domains, hashes, or URLs from threat intel and want to check if they appear in your SIEM. Systematic searching with enrichment and documentation. | 92 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
hunt-credential-access Hunt for credential access techniques like LSASS dumping or browser credential theft. Use when searching for evidence of credential harvesting. Takes MITRE technique IDs and searches for behavioral indicators in SIEM. | 96 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
hunt-apt Hunt for a specific APT/threat actor in your environment. Use when you have a threat actor name or GTI collection ID and want to search for their TTPs and IOCs. Gathers intelligence from GTI, searches SIEM for IOCs and TTP-based indicators, and documents findings. | 96 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
generate-thesaurus Generate controlled vocabulary thesaurus for content domains. Creates comprehensive thesauri with preferred terms, broader/narrower/related terms. | 60 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
generate-taxonomy Develop hierarchical classification systems. Creates parent-child categorical structures for content organization. | 46 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
generate-sitemap Generate hierarchical site structure and navigation maps. Creates visual representations of information architecture and content relationships. | 52 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
generate-report Save investigation findings to a markdown report file. Use after completing triage, enrichment, or investigation to create a permanent record. Generates timestamped files in ./reports/ directory. | 81 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
find-relevant-case Search for existing cases related to specific indicators or entities. Use to find correlation with other investigations before starting new analysis. Takes search terms and returns matching case IDs. | 75 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
enrich-ioc Enrich an IOC (IP, domain, hash, URL) with threat intelligence. Use when you need to look up reputation and context for an indicator using GTI and SIEM. Returns threat intel findings, SIEM entity summary, and IOC match status. | 93 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
document-in-case Add a comment to a case to document findings, actions, or recommendations. Use to maintain audit trail during investigations. Requires CASE_ID and comment text. | 81 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
design-metadata-schema Design comprehensive metadata frameworks. Develops structured metadata templates and tagging systems. | 46 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
deep-dive-ioc Perform exhaustive analysis of a critical IOC. Use when an IOC needs Tier 2+ investigation beyond basic enrichment - includes GTI pivoting, deep SIEM searches, correlation with related entities, and threat attribution. For escalated IOCs requiring comprehensive investigation. | 88 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
correlate-ioc Check for existing SIEM alerts and case management entries related to IOCs. Use to understand if an indicator has triggered previous alerts or is part of ongoing investigations. Takes IOC list and returns related alerts and cases. | 78 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
confirm-action Ask the user to confirm before taking a significant action. Use before containment, remediation, or other impactful operations to ensure analyst approval. Presents options and waits for response. | 63 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
cluster-documents Automated content similarity and grouping analysis. Groups related documents by topic, purpose, or content similarity. | 49 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
close-case-artifact Close a case or alert with proper reason and documentation. Use when triage determines an alert is FP/BTP or investigation is complete. Requires artifact ID, type, closure reason, and root cause. | 86 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
check-duplicates Check for duplicate or similar cases. Use before deep analysis to avoid investigating the same incident twice. Takes a CASE_ID and returns list of similar cases. | 87 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
audit-content Comprehensive content quality and maintenance assessment. Evaluates documentation quality, relevance, maintenance needs, and provides actionable recommendations. | 46 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
analyze-content-gaps Identify content gaps and organizational opportunities. Analyzes missing content areas, redundancies, and consolidation opportunities. | 46 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
full-investigation Complete Tier 2 investigation workflow. Orchestrates deep investigation of escalated cases: deep-dive-ioc, correlate-ioc, specialized triage (malware/login), pivot-on-ioc, and generate comprehensive report. Use for escalated cases requiring thorough analysis. | 78 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 | |
full-triage-alert Complete Tier 1 triage workflow. Orchestrates the full alert triage process: check-duplicates, triage-alert, enrich-ioc for each entity, and either close (FP/BTP) or escalate (TP/Suspicious). Use for end-to-end alert processing. | 83 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 4d132c7 |