CtrlK
BlogDocsLog inGet started
Tessl Logo

endor-fix

Remediate security vulnerabilities by finding safe upgrade paths. Use when the user says "fix this vulnerability", "how do I fix CVE-XXXX", "remediate this finding", "patch this vuln", "endor fix", or wants step-by-step fix instructions for a specific CVE, finding, or vulnerable package. Can apply fixes automatically. Do NOT use for general scanning (/endor-scan) or just viewing vulnerability info (/endor-explain).

94

Quality

92%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

SKILL.md
Quality
Evals
Security

Endor Labs Remediation Guide

Help users fix security vulnerabilities with safe upgrade paths and step-by-step remediation.

Input Parsing

The user may provide finding text (e.g., from a ticket) or at least one of:

  1. CVE ID — e.g., CVE-2021-23337
  2. Package name — e.g., lodash
  3. Finding UUID

Workflow

Step 1: Identify the Finding

If Finding UUID provided: Use get_resource MCP tool with resource_type: Finding and the UUID. If found, go to Step 2.

If CVE ID or package name provided: Use /endor-api skill to query Finding resource with appropriate filter. If found, go to Step 2.

If package name provided but no finding found: Use /endor-check skill instead.

If no finding found: Inform user. Indicate whether they are already at a recommended version.

Step 2: Find Upgrade Recommendation

Use /endor-upgrade-impact skill for pre-computed safe upgrade recommendations. If a recommendation exists, go to Step 3. If unavailable or no recommendation, use /endor-check skill instead.

Step 3: Present Remediation

## Remediation: {CVE-ID}

### Vulnerability

| Field | Value |
|-------|-------|
| CVE | {cve_id} |
| Severity | {severity} |
| Package | {package}@{current_version} |
| Description | {description} |
| Reachable | {yes/no — only known if finding found in Step 1} |

### Fix

**Recommended upgrade:** {package}@{current} -> {package}@{safe_version}
**Upgrade type:** {Patch/Minor/Major}

For install commands, read references/install-commands.md.

### Additional Fixes Needed

{If multiple CVEs affect this package, list them all and whether the recommended version fixes them}

Step 4: Offer to Apply Fix

Ask the user if they want you to:

  1. Update the dependency (or parent dependency for transitive vulnerabilities) in the manifest file
  2. Run the package manager install command

For data source policy, read references/data-sources.md.

For CLI field paths and parsing gotchas, read references/cli-parsing.md.

Error Handling

ErrorAction
No fix availableSuggest mitigation strategies (WAF rules, input validation, etc.)
Package not foundCheck package name and ecosystem
Auth errorSuggest /endor-setup
Repository
endorlabs/skills-ideas
Last updated
Created

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.