CtrlK
BlogDocsLog inGet started
Tessl Logo

analyzing-cobaltstrike-malleable-c2-profiles

Parse and analyze Cobalt Strike Malleable C2 profiles using dissect.cobaltstrike and pyMalleableC2 to extract C2 indicators, detect evasion techniques, and generate network detection signatures.

55

Quality

45%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./skills/analyzing-cobaltstrike-malleable-c2-profiles/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

82%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is a strong, highly specific description targeting a clear cybersecurity niche. It names concrete actions, specific tools, and domain-appropriate terminology that would naturally be used by security professionals. The main weakness is the absence of an explicit 'Use when...' clause, which would help Claude know exactly when to select this skill.

Suggestions

Add an explicit 'Use when...' clause, e.g., 'Use when the user asks about Cobalt Strike profiles, Malleable C2 configuration analysis, beacon detection, or generating IOCs from C2 profiles.'

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions: 'parse and analyze Malleable C2 profiles', 'extract C2 indicators', 'detect evasion techniques', 'generate network detection signatures'. Also names specific tools (dissect.cobaltstrike, pyMalleableC2).

3 / 3

Completeness

Clearly answers 'what does this do' with specific actions and tools, but lacks an explicit 'Use when...' clause or equivalent trigger guidance. The when is only implied by the nature of the actions described.

2 / 3

Trigger Term Quality

Includes highly relevant natural keywords a security analyst would use: 'Cobalt Strike', 'Malleable C2 profiles', 'C2 indicators', 'evasion techniques', 'network detection signatures'. These are the exact terms someone in threat intelligence or detection engineering would mention.

3 / 3

Distinctiveness Conflict Risk

Extremely niche and specific to Cobalt Strike Malleable C2 profile analysis with named libraries. Very unlikely to conflict with other skills given the highly specialized domain and specific tool references.

3 / 3

Total

11

/

12

Passed

Implementation

7%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This skill reads like a high-level outline or table of contents rather than actionable guidance. It lacks any executable code examples, concrete parsing demonstrations, or example outputs despite describing a code-heavy analysis workflow. The verbose overview and generic 'When to Use' section waste tokens on information Claude already knows, while the actual steps that need detail are left as vague one-liners.

Suggestions

Add complete, executable Python code examples showing how to parse a profile with dissect.cobaltstrike (e.g., `C2Profile.from_path()`, iterating over http-get/http-post blocks, extracting URIs and headers).

Include a concrete example of generating a Suricata rule from extracted indicators, showing the input profile snippet and the resulting rule.

Add validation checkpoints to the workflow: e.g., verify the profile parses without errors before extraction, validate generated Suricata rules with `suricata -T`, and confirm extracted IOCs against expected format.

Remove the 'When to Use' section and trim the overview to 1-2 sentences — Claude already knows what Malleable C2 profiles are and doesn't need the generic use cases.

DimensionReasoningScore

Conciseness

The overview explains what Malleable C2 profiles are and what the libraries do — concepts Claude already knows. The 'When to Use' section is generic boilerplate that adds no actionable value. Prerequisites list obvious items like 'Understanding of HTTP protocol.'

1 / 3

Actionability

Despite mentioning specific libraries, there is zero executable code — no Python snippets, no example profile parsing, no example Suricata rule generation. Steps are vague descriptions ('Extract HTTP GET/POST block configurations') rather than concrete commands or code.

1 / 3

Workflow Clarity

The 10 steps are a high-level checklist with no validation checkpoints, no error handling, no feedback loops, and no concrete commands. There's no guidance on what to do if parsing fails or if a profile uses an unexpected format. For a multi-step analysis workflow involving signature generation, this lacks critical verification steps.

1 / 3

Progressive Disclosure

The content is organized into clear sections (Overview, When to Use, Prerequisites, Steps, Expected Output), which provides some structure. However, there are no references to external files for detailed examples, API references, or signature templates, and the content is neither too long to need splitting nor well-enough organized to score higher.

2 / 3

Total

5

/

12

Passed

Validation

90%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation10 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

10

/

11

Passed

Repository
mukul975/Anthropic-Cybersecurity-Skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.