security-incident-response

Installation
SKILL.md

Security Incident Response

Investigate the incident, determine exposure, and produce a practical response plan. Be careful, evidence-driven, and explicit about uncertainty.

This skill covers incidents such as CVEs, framework advisories, npm/PyPI/RubyGems supply-chain attacks, compromised GitHub Actions, cache poisoning, leaked tokens, malicious packages, and vulnerable dependency ranges.

Safety rules

  • Do not execute untrusted project scripts, package lifecycle hooks, or downloaded PoCs.
  • Prefer static inspection, lockfile parsing, and scanners that do not run project code.
  • If installation is necessary, use safe modes such as npm ci --ignore-scripts, pnpm install --ignore-scripts, or equivalent.
  • Do not publish exploitable details unnecessarily. Use private disclosure channels for third-party findings.
  • Preserve evidence: URLs, advisory IDs, affected versions, command output, lockfile paths, and timestamps.
  • Distinguish confirmed exposure from possible exposure and unknowns.

Workflow

1. Clarify scope without blocking

Related skills
Installs
1
Repository
olivoil/skills
First Seen
3 days ago