CtrlK
BlogDocsLog inGet started
Tessl Logo

hunt-apt

Hunt for a specific APT/threat actor in your environment. Use when you have a threat actor name or GTI collection ID and want to search for their TTPs and IOCs. Gathers intelligence from GTI, searches SIEM for IOCs and TTP-based indicators, and documents findings.

96

Quality

96%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

SKILL.md
Quality
Evals
Security

Quality

Discovery

100%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is an excellent skill description that clearly defines its purpose (threat actor hunting), specifies concrete actions (gathering GTI intelligence, SIEM searches, documentation), and provides explicit trigger conditions (threat actor name or GTI collection ID). The domain-specific terminology is appropriate for the security analyst audience and creates clear distinctiveness from other potential skills.

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions: 'Hunt for a specific APT/threat actor', 'Gathers intelligence from GTI', 'searches SIEM for IOCs and TTP-based indicators', and 'documents findings'. These are clear, actionable capabilities.

3 / 3

Completeness

Clearly answers both what ('Hunt for APT/threat actor', 'Gathers intelligence', 'searches SIEM', 'documents findings') AND when ('Use when you have a threat actor name or GTI collection ID and want to search for their TTPs and IOCs').

3 / 3

Trigger Term Quality

Includes strong natural keywords users would say: 'APT', 'threat actor', 'GTI collection ID', 'TTPs', 'IOCs', 'SIEM', 'threat intelligence'. These are domain-appropriate terms security analysts would naturally use.

3 / 3

Distinctiveness Conflict Risk

Highly distinctive with clear niche: APT/threat actor hunting with specific GTI and SIEM integration. The combination of threat actor focus, GTI collection IDs, and TTP/IOC searching creates a unique, non-conflicting scope.

3 / 3

Total

12

/

12

Passed

Implementation

92%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This is a high-quality threat hunting skill with excellent actionability and workflow clarity. The step-by-step process is well-sequenced with concrete tool calls, decision points, and documentation requirements. Minor improvement needed in signaling dependencies on other skills/commands.

Suggestions

Add brief inline notes or a 'Related Skills' section explaining where `/find-relevant-case`, `/document-in-case`, and `/generate-report` are located or how to invoke them

DimensionReasoningScore

Conciseness

The skill is lean and efficient, assuming Claude's competence with security concepts. No unnecessary explanations of what APTs are, how SIEM works, or basic threat hunting concepts. Every section serves a clear purpose.

3 / 3

Actionability

Provides specific, executable tool calls with exact function names and parameters. Each step has concrete commands like `gti-mcp.get_collection_report(id=THREAT_ACTOR_ID)` that are copy-paste ready with clear parameter substitution.

3 / 3

Workflow Clarity

Clear 8-step sequence with logical progression from intelligence gathering through escalation. Includes decision points (Step 8: confirmed vs not found), conditional steps (Step 5: 'If hits found'), and explicit documentation requirements throughout.

3 / 3

Progressive Disclosure

Well-organized with clear sections and tables, but references other skills (`/find-relevant-case`, `/document-in-case`, `/generate-report`) without explaining where they are or how to access them. The skill is self-contained but could better signal these dependencies.

2 / 3

Total

11

/

12

Passed

Validation

90%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation10 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

10

/

11

Passed

Repository
dandye/ai-runbooks
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.