<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Mahipal Mahipal</title>
    <description>The latest articles on DEV Community by Mahipal Mahipal (@mahipal975).</description>
    <link>https://dev.to/mahipal975</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3779572%2F096c4b1d-b7a0-428d-8288-69966cea92c7.gif</url>
      <title>DEV Community: Mahipal Mahipal</title>
      <link>https://dev.to/mahipal975</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/mahipal975"/>
    <language>en</language>
    <item>
      <title>I mapped 754 cybersecurity skills to 5 frameworks so your AI agent doesn't have to wing it</title>
      <dc:creator>Mahipal Mahipal</dc:creator>
      <pubDate>Mon, 06 Apr 2026 12:43:30 +0000</pubDate>
      <link>https://dev.to/mahipal975/i-mapped-754-cybersecurity-skills-to-5-frameworks-so-your-ai-agent-doesnt-have-to-wing-it-fih</link>
      <guid>https://dev.to/mahipal975/i-mapped-754-cybersecurity-skills-to-5-frameworks-so-your-ai-agent-doesnt-have-to-wing-it-fih</guid>
      <description>&lt;p&gt;AI agents are everywhere in 2026. They write code, triage alerts,&lt;br&gt;
analyze logs, scan infrastructure. But ask one to investigate a&lt;br&gt;
suspicious memory dump or hunt for C2 beaconing and it improvises.&lt;br&gt;
No structure. No framework alignment. No verification steps.&lt;/p&gt;

&lt;p&gt;That's the gap I've been working on.&lt;/p&gt;

&lt;h2&gt;
  
  
  What I built
&lt;/h2&gt;

&lt;p&gt;Anthropic Cybersecurity Skills is an open-source library of 754&lt;br&gt;
structured cybersecurity skills for AI agents. Every skill is a&lt;br&gt;
self-contained directory:&lt;br&gt;
skills/performing-memory-forensics-with-volatility3/&lt;br&gt;
├── SKILL.md          ← YAML frontmatter + step-by-step workflow&lt;br&gt;
├── references/&lt;br&gt;
│   ├── standards.md  ← framework mappings&lt;br&gt;
│   └── workflows.md  ← deep technical procedures&lt;br&gt;
├── scripts/&lt;br&gt;
│   └── process.py    ← functional helper scripts&lt;br&gt;
└── assets/&lt;br&gt;
└── template.md   ← report templates&lt;/p&gt;

&lt;p&gt;Each SKILL.md has YAML frontmatter for agent discovery and a&lt;br&gt;
structured Markdown body for execution. The design is built around&lt;br&gt;
progressive disclosure — irrelevant skills cost ~30 tokens to scan,&lt;br&gt;
relevant ones provide complete expert-level guidance.&lt;/p&gt;

&lt;h2&gt;
  
  
  v1.2.0 — the five-framework release
&lt;/h2&gt;

&lt;p&gt;Today I shipped the update I've been working toward since launch.&lt;br&gt;
754 skills now mapped to &lt;strong&gt;5 industry frameworks simultaneously&lt;/strong&gt;.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Framework&lt;/th&gt;
&lt;th&gt;Skills mapped&lt;/th&gt;
&lt;th&gt;What it covers&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;MITRE ATT&amp;amp;CK Enterprise&lt;/td&gt;
&lt;td&gt;754 / 754&lt;/td&gt;
&lt;td&gt;Adversary tactics and techniques&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;NIST CSF 2.0&lt;/td&gt;
&lt;td&gt;754 / 754&lt;/td&gt;
&lt;td&gt;Cybersecurity risk management&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;MITRE ATLAS v5.5&lt;/td&gt;
&lt;td&gt;81&lt;/td&gt;
&lt;td&gt;AI/ML adversarial threats&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;MITRE D3FEND v1.3&lt;/td&gt;
&lt;td&gt;139&lt;/td&gt;
&lt;td&gt;Defensive countermeasures&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;NIST AI RMF 1.0&lt;/td&gt;
&lt;td&gt;85&lt;/td&gt;
&lt;td&gt;AI risk management&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;No other open-source library does this.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why five frameworks?
&lt;/h2&gt;

&lt;p&gt;Each one serves a different audience and a different question.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;ATT&amp;amp;CK&lt;/strong&gt; answers: what technique is the adversary using?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NIST CSF 2.0&lt;/strong&gt; answers: which risk management function does&lt;br&gt;
this skill address? (Identify, Protect, Detect, Respond, Recover,&lt;br&gt;
or the new Govern function)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;MITRE ATLAS&lt;/strong&gt; answers: if the target is an AI or ML system,&lt;br&gt;
which adversarial technique applies? Model poisoning, prompt&lt;br&gt;
injection, supply chain compromise, escape-to-host from an&lt;br&gt;
agentic container — these have no ATT&amp;amp;CK equivalents. ATLAS&lt;br&gt;
v5.5 added agentic AI techniques in the last two releases.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;D3FEND&lt;/strong&gt; answers: what do you actually DO to defend against it?&lt;br&gt;
ATT&amp;amp;CK maps attacks. D3FEND maps the 267 countermeasures that&lt;br&gt;
stop them. A skill like detecting suspicious PowerShell execution&lt;br&gt;
now tells your agent: this counters T1059.001, and here are the&lt;br&gt;
D3FEND defensive techniques (D3-EWF, D3-PSA) that apply.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NIST AI RMF&lt;/strong&gt; answers: where does this fit in the AI risk&lt;br&gt;
lifecycle? With the EU AI Act's full requirements going live&lt;br&gt;
August 2 and Colorado's AI Act citing NIST AI RMF as legal&lt;br&gt;
safe harbor, this mapping matters right now.&lt;/p&gt;

&lt;h2&gt;
  
  
  What the frontmatter looks like
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight yaml"&gt;&lt;code&gt;&lt;span class="na"&gt;name&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;detecting-prompt-injection-attacks&lt;/span&gt;
&lt;span class="na"&gt;description&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="pi"&gt;&amp;gt;-&lt;/span&gt;
  &lt;span class="s"&gt;Detect and prevent prompt injection attacks against LLM&lt;/span&gt;
  &lt;span class="s"&gt;applications, AI agents, and chatbot interfaces. Covers&lt;/span&gt;
  &lt;span class="s"&gt;direct injection, indirect injection via retrieved content,&lt;/span&gt;
  &lt;span class="s"&gt;jailbreak detection, and input validation strategies.&lt;/span&gt;
&lt;span class="na"&gt;domain&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;cybersecurity&lt;/span&gt;
&lt;span class="na"&gt;subdomain&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;ai-security&lt;/span&gt;
&lt;span class="na"&gt;tags&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="pi"&gt;[&lt;/span&gt;&lt;span class="nv"&gt;prompt-injection&lt;/span&gt;&lt;span class="pi"&gt;,&lt;/span&gt; &lt;span class="nv"&gt;ai-security&lt;/span&gt;&lt;span class="pi"&gt;,&lt;/span&gt; &lt;span class="nv"&gt;llm&lt;/span&gt;&lt;span class="pi"&gt;,&lt;/span&gt; &lt;span class="nv"&gt;T1059.001&lt;/span&gt;&lt;span class="pi"&gt;]&lt;/span&gt;
&lt;span class="na"&gt;frameworks&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
  &lt;span class="na"&gt;mitre-attack&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="pi"&gt;[&lt;/span&gt;&lt;span class="nv"&gt;T1059.001&lt;/span&gt;&lt;span class="pi"&gt;,&lt;/span&gt; &lt;span class="nv"&gt;T1078&lt;/span&gt;&lt;span class="pi"&gt;]&lt;/span&gt;
  &lt;span class="na"&gt;nist-csf&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="pi"&gt;[&lt;/span&gt;&lt;span class="nv"&gt;DE.CM-01&lt;/span&gt;&lt;span class="pi"&gt;,&lt;/span&gt; &lt;span class="nv"&gt;DE.AE-02&lt;/span&gt;&lt;span class="pi"&gt;]&lt;/span&gt;
  &lt;span class="na"&gt;mitre-atlas&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="pi"&gt;[&lt;/span&gt;&lt;span class="nv"&gt;AML.T0017&lt;/span&gt;&lt;span class="pi"&gt;,&lt;/span&gt; &lt;span class="nv"&gt;AML.T0051&lt;/span&gt;&lt;span class="pi"&gt;]&lt;/span&gt;
  &lt;span class="na"&gt;mitre-d3fend&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="pi"&gt;[&lt;/span&gt;&lt;span class="nv"&gt;D3-IDA&lt;/span&gt;&lt;span class="pi"&gt;,&lt;/span&gt; &lt;span class="nv"&gt;D3-ODA&lt;/span&gt;&lt;span class="pi"&gt;]&lt;/span&gt;
  &lt;span class="na"&gt;nist-ai-rmf&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="pi"&gt;[&lt;/span&gt;&lt;span class="nv"&gt;MEASURE-2.7&lt;/span&gt;&lt;span class="pi"&gt;,&lt;/span&gt; &lt;span class="nv"&gt;GOVERN-6.1&lt;/span&gt;&lt;span class="pi"&gt;]&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Five framework fields. One skill. Zero manual mapping required.&lt;/p&gt;

&lt;h2&gt;
  
  
  What's in the 754 skills
&lt;/h2&gt;

&lt;p&gt;26 security domains. The top ones by skill count:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Cloud Security (60) — AWS S3 audits, Azure AD review, GCP IAM&lt;/li&gt;
&lt;li&gt;Threat Hunting (55) — C2 beaconing, DNS tunneling, LOTL detection&lt;/li&gt;
&lt;li&gt;Threat Intelligence (50) — APT attribution, campaign analysis, IOC enrichment&lt;/li&gt;
&lt;li&gt;Web App Security (42) — HTTP smuggling, XSS, deserialization&lt;/li&gt;
&lt;li&gt;Network Security (40) — Wireshark analysis, Suricata tuning, VLAN segmentation&lt;/li&gt;
&lt;li&gt;Malware Analysis (39) — Ghidra, YARA, .NET decompilation&lt;/li&gt;
&lt;li&gt;Digital Forensics (37) — Volatility3, disk imaging, browser artifacts&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Plus OT/ICS, container security, zero trust, API security,&lt;br&gt;
DevSecOps, mobile, cryptography, red teaming, and more.&lt;/p&gt;

&lt;h2&gt;
  
  
  How agents actually use this
&lt;/h2&gt;

&lt;p&gt;Your agent scans frontmatters first (~30 tokens each). When a&lt;br&gt;
skill matches the task, it loads the full SKILL.md and references.&lt;br&gt;
Here's what happens when a user says "check this memory dump for&lt;br&gt;
credential theft":&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Agent scans 754 frontmatters → finds 12 relevant skills&lt;/li&gt;
&lt;li&gt;Loads top matches including &lt;code&gt;performing-memory-forensics-with-volatility3&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Follows the structured Volatility3 workflow&lt;/li&gt;
&lt;li&gt;Maps findings to ATT&amp;amp;CK T1003 (Credential Dumping)&lt;/li&gt;
&lt;li&gt;References D3FEND D3-PSMD for defensive recommendations&lt;/li&gt;
&lt;li&gt;Outputs structured findings with framework references&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;No improvisation. No hallucinated tool flags. Structured output&lt;br&gt;
with framework alignment baked in.&lt;/p&gt;

&lt;h2&gt;
  
  
  Install
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;npx skills add mukul975/Anthropic-Cybersecurity-Skills
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Works with Claude Code, GitHub Copilot, OpenAI Codex CLI, Cursor,&lt;br&gt;
Gemini CLI, and any MCP-compatible agent.&lt;/p&gt;

&lt;h2&gt;
  
  
  Contributing
&lt;/h2&gt;

&lt;p&gt;Apache 2.0. PRs reviewed within 48 hours. The easiest first&lt;br&gt;
contribution is adding MITRE ATT&amp;amp;CK technique IDs to the 74&lt;br&gt;
incident-response skills that still need mapping — see Issue #1.&lt;/p&gt;




&lt;p&gt;The repo hit 4,100 stars in a few weeks entirely from community&lt;br&gt;
sharing. If this solves a problem you've been working around,&lt;br&gt;
a star helps others find it.&lt;/p&gt;

&lt;p&gt;github.com/mukul975/Anthropic-Cybersecurity-Skills&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>ai</category>
      <category>opensource</category>
      <category>agentskills</category>
    </item>
    <item>
      <title>How 734+ Cybersecurity Skills Make AI Agents Stop Hallucinating Security Procedures</title>
      <dc:creator>Mahipal Mahipal</dc:creator>
      <pubDate>Fri, 20 Mar 2026 11:35:11 +0000</pubDate>
      <link>https://dev.to/mahipal975/how-734-cybersecurity-skills-make-ai-agents-stop-hallucinating-security-procedures-54ep</link>
      <guid>https://dev.to/mahipal975/how-734-cybersecurity-skills-make-ai-agents-stop-hallucinating-security-procedures-54ep</guid>
      <description>&lt;p&gt;Last week an engineer on our team asked an AI agent to perform memory forensics on a RAM dump from a compromised workstation. The agent confidently ran &lt;code&gt;volatility -f memory.dmp imageinfo&lt;/code&gt;, produced a plausible-looking profile match, then suggested deleting the original memory dump to "free up disk space for the analysis output."&lt;/p&gt;

&lt;p&gt;That single recommendation would have destroyed the chain of custody. The entire case -- potential litigation, regulatory reporting, insurance claims -- gone. Not because the model was stupid, but because it had no structured understanding of forensic procedure. It pattern-matched its way to a command that looked right, then filled the gap with a hallucinated best practice that any first-year DFIR analyst would reject on sight.&lt;/p&gt;

&lt;p&gt;This is not an edge case. AI agents hallucinate security procedures constantly. They invent Nmap flags that do not exist. They suggest Splunk queries with fields from the wrong sourcetype. They recommend &lt;code&gt;chmod 777&lt;/code&gt; as a troubleshooting step. And in security, a wrong step is not just inefficient -- it can be destructive, illegal, or both.&lt;/p&gt;

&lt;p&gt;I built a database of 611 structured cybersecurity skills to solve this. It is open source, follows the agentskills.io standard, and you can plug it into any AI agent today.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why General-Purpose LLMs Fail at Security
&lt;/h2&gt;

&lt;p&gt;Large language models are trained on internet-scale text. They have seen security documentation, blog posts, CTF writeups, and Stack Overflow threads. But they have never &lt;em&gt;executed&lt;/em&gt; a forensic investigation. They do not understand that memory acquisition must happen before analysis, that evidence integrity requires hash verification at every step, or that you never modify the original artifact.&lt;/p&gt;

&lt;p&gt;The failure mode is specific: LLMs produce outputs that are &lt;em&gt;syntactically correct but procedurally wrong&lt;/em&gt;. The commands look real. The tool names are right. But the sequencing, the preconditions, the verification steps -- these are where hallucinations hide. A model might suggest running &lt;code&gt;windows.hashdump&lt;/code&gt; before confirming the OS profile, or pipe &lt;code&gt;malfind&lt;/code&gt; output directly to a file on the evidence drive, contaminating the source.&lt;/p&gt;

&lt;p&gt;The &lt;a href="https://agentskills.io/specification" rel="noopener noreferrer"&gt;agentskills.io standard&lt;/a&gt; solves this with structure. A skill is a directory containing a &lt;code&gt;SKILL.md&lt;/code&gt; file (YAML frontmatter plus markdown instructions), optional automation scripts, and reference documentation. Each skill defines explicit prerequisites, ordered workflow steps, verification criteria, and tool-specific commands. When an agent loads a skill, it gets the complete procedural context -- not a probabilistic guess at what might come next.&lt;/p&gt;

&lt;p&gt;This is retrieval-augmented generation applied to operational procedures. Instead of hoping the model remembers the right sequence, you give it the sequence. The hallucination surface shrinks to near zero on covered tasks because the agent is following a verified playbook, not generating one from scratch.&lt;/p&gt;

&lt;h2&gt;
  
  
  Anatomy of a Skill: Memory Forensics with Volatility 3
&lt;/h2&gt;

&lt;p&gt;Let me walk through one skill in full detail so you can see what structured procedural knowledge looks like. This is &lt;code&gt;performing-memory-forensics-with-volatility3&lt;/code&gt;.&lt;/p&gt;

&lt;h3&gt;
  
  
  The SKILL.md Frontmatter
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight yaml"&gt;&lt;code&gt;&lt;span class="nn"&gt;---&lt;/span&gt;
&lt;span class="na"&gt;name&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;performing-memory-forensics-with-volatility3&lt;/span&gt;
&lt;span class="na"&gt;description&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="s"&gt;&amp;gt;"&lt;/span&gt;
  &lt;span class="s"&gt;Analyze volatile memory dumps using Volatility 3 to extract running&lt;/span&gt;
  &lt;span class="s"&gt;processes, network connections, loaded modules, and evidence of&lt;/span&gt;
  &lt;span class="s"&gt;malicious activity.&lt;/span&gt;
&lt;span class="na"&gt;domain&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;cybersecurity&lt;/span&gt;
&lt;span class="na"&gt;subdomain&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;digital-forensics&lt;/span&gt;
&lt;span class="na"&gt;tags&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
  &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="s"&gt;forensics&lt;/span&gt;
  &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="s"&gt;memory-forensics&lt;/span&gt;
  &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="s"&gt;volatility&lt;/span&gt;
  &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="s"&gt;ram-analysis&lt;/span&gt;
  &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="s"&gt;malware-detection&lt;/span&gt;
  &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="s"&gt;incident-response&lt;/span&gt;
&lt;span class="na"&gt;version&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="s"&gt;1.0"&lt;/span&gt;
&lt;span class="na"&gt;author&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;mahipal&lt;/span&gt;
&lt;span class="na"&gt;license&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;Apache-2.0&lt;/span&gt;
&lt;span class="nn"&gt;---&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Every field is machine-parseable. An agent can filter by domain, subdomain, or tag to find the right skill for the task at hand. The description tells the agent &lt;em&gt;when&lt;/em&gt; this skill applies.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Workflow
&lt;/h3&gt;

&lt;p&gt;The skill defines seven sequential steps. Here is the core forensic sequence:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2 -- Identify the OS profile:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;vol &lt;span class="nt"&gt;-f&lt;/span&gt; /cases/case-2024-001/memory/memory.raw windows.info
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Step 3 -- Enumerate processes and detect anomalies:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# List all running processes&lt;/span&gt;
vol &lt;span class="nt"&gt;-f&lt;/span&gt; memory.raw windows.pslist | &lt;span class="nb"&gt;tee&lt;/span&gt; /cases/analysis/pslist.txt

&lt;span class="c"&gt;# Detect hidden processes using cross-view analysis&lt;/span&gt;
vol &lt;span class="nt"&gt;-f&lt;/span&gt; memory.raw windows.psscan | &lt;span class="nb"&gt;tee&lt;/span&gt; /cases/analysis/psscan.txt

&lt;span class="c"&gt;# Check for process hollowing and injection&lt;/span&gt;
vol &lt;span class="nt"&gt;-f&lt;/span&gt; memory.raw windows.malfind | &lt;span class="nb"&gt;tee&lt;/span&gt; /cases/analysis/malfind.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Step 4 -- Network connections and registry:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;vol &lt;span class="nt"&gt;-f&lt;/span&gt; memory.raw windows.netscan | &lt;span class="nb"&gt;grep &lt;/span&gt;ESTABLISHED
vol &lt;span class="nt"&gt;-f&lt;/span&gt; memory.raw windows.registry.printkey &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--key&lt;/span&gt; &lt;span class="s2"&gt;"Software&lt;/span&gt;&lt;span class="se"&gt;\M&lt;/span&gt;&lt;span class="s2"&gt;icrosoft&lt;/span&gt;&lt;span class="se"&gt;\W&lt;/span&gt;&lt;span class="s2"&gt;indows&lt;/span&gt;&lt;span class="se"&gt;\C&lt;/span&gt;&lt;span class="s2"&gt;urrentVersion&lt;/span&gt;&lt;span class="se"&gt;\R&lt;/span&gt;&lt;span class="s2"&gt;un"&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Step 5 -- Extract credentials:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;vol &lt;span class="nt"&gt;-f&lt;/span&gt; memory.raw windows.hashdump
vol &lt;span class="nt"&gt;-f&lt;/span&gt; memory.raw windows.lsadump
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Step 6 -- YARA scanning:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;vol &lt;span class="nt"&gt;-f&lt;/span&gt; memory.raw yarascan &lt;span class="nt"&gt;--yara-file&lt;/span&gt; /opt/yara-rules/malware_index.yar
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Notice what the skill &lt;em&gt;prevents&lt;/em&gt;: the agent will not skip OS identification (step 2) and jump to credential extraction (step 5). It will not delete the source image. It will &lt;code&gt;tee&lt;/code&gt; output to a separate analysis directory, preserving evidence integrity. Every command writes to &lt;code&gt;/cases/analysis/&lt;/code&gt;, never to the evidence directory.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Automation Script
&lt;/h3&gt;

&lt;p&gt;Each skill includes a &lt;code&gt;scripts/agent.py&lt;/code&gt; that wraps the workflow into executable automation:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="k"&gt;class&lt;/span&gt; &lt;span class="nc"&gt;MemoryForensicsAgent&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
    &lt;span class="k"&gt;def&lt;/span&gt; &lt;span class="nf"&gt;__init__&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;self&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;memory_dump&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;output_dir&lt;/span&gt;&lt;span class="p"&gt;):&lt;/span&gt;
        &lt;span class="n"&gt;self&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;memory_dump&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;memory_dump&lt;/span&gt;
        &lt;span class="n"&gt;self&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;output_dir&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nc"&gt;Path&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;output_dir&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

    &lt;span class="k"&gt;def&lt;/span&gt; &lt;span class="nf"&gt;detect_anomalies&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;self&lt;/span&gt;&lt;span class="p"&gt;):&lt;/span&gt;
        &lt;span class="sh"&gt;"""&lt;/span&gt;&lt;span class="s"&gt;Compare pslist vs psscan to find hidden processes.&lt;/span&gt;&lt;span class="sh"&gt;"""&lt;/span&gt;
        &lt;span class="n"&gt;pslist&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;self&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;_run_vol&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;windows.pslist&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
        &lt;span class="n"&gt;psscan&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;self&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;_run_vol&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;windows.psscan&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
        &lt;span class="n"&gt;pslist_pids&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;set&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;re&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;findall&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;r&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;^\s*(\d+)\s&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;pslist&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;output&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;],&lt;/span&gt; &lt;span class="n"&gt;re&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;MULTILINE&lt;/span&gt;&lt;span class="p"&gt;))&lt;/span&gt;
        &lt;span class="n"&gt;psscan_pids&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;set&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;re&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;findall&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;r&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;^\s*(\d+)\s&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;psscan&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;output&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;],&lt;/span&gt; &lt;span class="n"&gt;re&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;MULTILINE&lt;/span&gt;&lt;span class="p"&gt;))&lt;/span&gt;
        &lt;span class="n"&gt;hidden&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;psscan_pids&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt; &lt;span class="n"&gt;pslist_pids&lt;/span&gt;
        &lt;span class="k"&gt;return&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;hidden_pids&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="nf"&gt;sorted&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;hidden&lt;/span&gt;&lt;span class="p"&gt;),&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;hidden_count&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="nf"&gt;len&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;hidden&lt;/span&gt;&lt;span class="p"&gt;)}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This is not a wrapper around a chat prompt. It is deterministic code that executes the forensically sound procedure every time.&lt;/p&gt;

&lt;h3&gt;
  
  
  MITRE ATT&amp;amp;CK Mapping
&lt;/h3&gt;

&lt;p&gt;This skill maps to real ATT&amp;amp;CK techniques that the forensic workflow is designed to detect:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;T1055 -- Process Injection&lt;/strong&gt; (Defense Evasion, Privilege Escalation): Detected by &lt;code&gt;windows.malfind&lt;/code&gt;, which examines VAD permissions and memory content for injected code&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;T1003.001 -- LSASS Memory&lt;/strong&gt; (Credential Access): Detected by &lt;code&gt;windows.hashdump&lt;/code&gt; and &lt;code&gt;windows.lsadump&lt;/code&gt;, which extract credentials from LSASS process memory&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;T1059.001 -- PowerShell&lt;/strong&gt; (Execution): Detected by &lt;code&gt;windows.cmdline&lt;/code&gt;, which extracts command-line arguments revealing script execution&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;T1014 -- Rootkit&lt;/strong&gt; (Defense Evasion): Detected by comparing &lt;code&gt;windows.modules&lt;/code&gt; vs &lt;code&gt;windows.modscan&lt;/code&gt; to find hidden kernel drivers&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The mapping is bidirectional. Given an ATT&amp;amp;CK technique ID, you can find which skills detect it. Given a skill, you know which adversary behaviors it covers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Quick Start: Three Ways to Install
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Option 1: npx (agentskills.io compatible)
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;npx skills add mukul975/Anthropic-Cybersecurity-Skills
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Option 2: Claude Code / Cursor Plugin Marketplace
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;/plugin marketplace add mukul975/Anthropic-Cybersecurity-Skills
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Option 3: Git Clone
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;git clone https://github.com/mukul975/Anthropic-Cybersecurity-Skills.git
&lt;span class="nb"&gt;cd &lt;/span&gt;Anthropic-Cybersecurity-Skills/skills/
&lt;span class="nb"&gt;ls&lt;/span&gt; | &lt;span class="nb"&gt;head&lt;/span&gt; &lt;span class="nt"&gt;-20&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Using a Skill with Your Agent
&lt;/h3&gt;

&lt;p&gt;Once installed, an agent can load a skill by name. Here is what a typical interaction looks like after the skills are loaded:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;User: "Analyze this memory dump from the compromised web server."

Agent (with skill loaded):
  1. Verifying memory dump integrity: sha256sum memory.raw
  2. Identifying OS profile: vol -f memory.raw windows.info
  3. Enumerating processes: vol -f memory.raw windows.pslist
  4. Scanning for hidden processes: vol -f memory.raw windows.psscan
  5. Detecting injected code: vol -f memory.raw windows.malfind
  6. Extracting network connections: vol -f memory.raw windows.netscan
  7. Scanning with YARA rules: vol -f memory.raw yarascan
  8. Generating report to /cases/analysis/

Agent (without skill):
  1. "Let me analyze the memory dump."
  2. volatility -f memory.dmp imageinfo  # Wrong tool version
  3. "I recommend deleting the original file to save space."  # Chain of custody violation
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The difference is not marginal. It is the difference between admissible evidence and a compromised investigation.&lt;/p&gt;

&lt;h2&gt;
  
  
  Coverage Map
&lt;/h2&gt;

&lt;p&gt;The database covers 646 skills across 18 cybersecurity subdomains:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Subdomain&lt;/th&gt;
&lt;th&gt;Skills&lt;/th&gt;
&lt;th&gt;Key Tools&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Cloud Security&lt;/td&gt;
&lt;td&gt;60&lt;/td&gt;
&lt;td&gt;AWS GuardDuty, Azure Defender, GCP Forseti&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Threat Hunting&lt;/td&gt;
&lt;td&gt;53&lt;/td&gt;
&lt;td&gt;Splunk, Elastic SIEM, YARA, Sigma&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Web Application Security&lt;/td&gt;
&lt;td&gt;41&lt;/td&gt;
&lt;td&gt;Burp Suite, SQLMap, Nikto, OWASP ZAP&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Network Security&lt;/td&gt;
&lt;td&gt;40&lt;/td&gt;
&lt;td&gt;Nmap, Snort, Suricata, Wireshark&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Threat Intelligence&lt;/td&gt;
&lt;td&gt;39&lt;/td&gt;
&lt;td&gt;MISP, STIX/TAXII, Diamond Model&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Malware Analysis&lt;/td&gt;
&lt;td&gt;39&lt;/td&gt;
&lt;td&gt;Ghidra, Cuckoo, PE Studio, Volatility&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Digital Forensics&lt;/td&gt;
&lt;td&gt;37&lt;/td&gt;
&lt;td&gt;Autopsy, Volatility 3, Plaso, Foremost&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Security Operations&lt;/td&gt;
&lt;td&gt;36&lt;/td&gt;
&lt;td&gt;Splunk, QRadar, Sentinel, SOAR&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Identity &amp;amp; Access Management&lt;/td&gt;
&lt;td&gt;35&lt;/td&gt;
&lt;td&gt;Okta, SailPoint, Active Directory&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;SOC Operations&lt;/td&gt;
&lt;td&gt;33&lt;/td&gt;
&lt;td&gt;Sigma rules, alert triage, playbooks&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Container Security&lt;/td&gt;
&lt;td&gt;30&lt;/td&gt;
&lt;td&gt;Falco, Aqua, Kubernetes RBAC&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Vulnerability Management&lt;/td&gt;
&lt;td&gt;25&lt;/td&gt;
&lt;td&gt;Nessus, Terraform audit, CIS Benchmarks&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Red Teaming&lt;/td&gt;
&lt;td&gt;24&lt;/td&gt;
&lt;td&gt;Metasploit, Cobalt Strike, BloodHound&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;DevSecOps&lt;/td&gt;
&lt;td&gt;17&lt;/td&gt;
&lt;td&gt;Trufflehog, code signing, CI/CD security&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Phishing Defense&lt;/td&gt;
&lt;td&gt;16&lt;/td&gt;
&lt;td&gt;GoPhish, DMARC/DKIM/SPF, header analysis&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Endpoint Security&lt;/td&gt;
&lt;td&gt;16&lt;/td&gt;
&lt;td&gt;osquery, Sysmon, fileless malware detection&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;OT/ICS Security&lt;/td&gt;
&lt;td&gt;14&lt;/td&gt;
&lt;td&gt;Modbus, IEC 62443, historian servers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Cryptography&lt;/td&gt;
&lt;td&gt;14&lt;/td&gt;
&lt;td&gt;Ed25519, TLS analysis, zero-knowledge proofs&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;ATT&amp;amp;CK coverage is strongest in Defense Evasion (T1055, T1014, T1548), Credential Access (T1003, T1558), Discovery, and Lateral Movement. The threat hunting and SOC operations skills together cover the full detection lifecycle from initial alert through incident closure.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Comes Next
&lt;/h2&gt;

&lt;p&gt;The database ships under Apache-2.0. Fork it, extend it, ship it with your agent.&lt;/p&gt;

&lt;p&gt;Areas where contributions would have the most impact right now:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Mobile security&lt;/strong&gt; -- currently 5 skills, needs 20+ for adequate coverage&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Compliance/governance&lt;/strong&gt; -- GRC workflows are underrepresented&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;OT/ICS&lt;/strong&gt; -- industrial control system skills need protocol-specific depth&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Wireless security&lt;/strong&gt; -- only 1 skill currently&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Check the &lt;a href="https://github.com/mukul975/Anthropic-Cybersecurity-Skills/blob/main/CONTRIBUTING.md" rel="noopener noreferrer"&gt;CONTRIBUTING.md&lt;/a&gt; for the skill format specification and submission process. If you have operational playbooks that your SOC uses daily, those are exactly the kind of procedures that should become skills.&lt;/p&gt;

&lt;p&gt;Star the repo: &lt;a href="https://github.com/mukul975/Anthropic-Cybersecurity-Skills" rel="noopener noreferrer"&gt;github.com/mukul975/Anthropic-Cybersecurity-Skills&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Mahipal Jangra, M.Sc. Cybersecurity. Building structured knowledge for AI agents so they stop making up security procedures.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cybersecurity</category>
      <category>opensource</category>
      <category>ai</category>
    </item>
    <item>
      <title>How I Built an Open-Source Cybersecurity Skills Database for AI Agents (611+ Skills)</title>
      <dc:creator>Mahipal Mahipal</dc:creator>
      <pubDate>Wed, 04 Mar 2026 21:26:03 +0000</pubDate>
      <link>https://dev.to/mahipal975/how-i-built-an-open-source-cybersecurity-skills-database-for-ai-agents-611-skills-54oi</link>
      <guid>https://dev.to/mahipal975/how-i-built-an-open-source-cybersecurity-skills-database-for-ai-agents-611-skills-54oi</guid>
      <description>&lt;h1&gt;
  
  
  How I Built an Open-Source Cybersecurity Skills Database for AI Agents (611+ Skills)
&lt;/h1&gt;

&lt;p&gt;AI agents are transforming software engineering. Tools like Claude Code, GitHub Copilot, and Cursor can write code, debug issues, and refactor entire codebases. But ask one to analyze a memory dump from a compromised server, triage a SIEM alert, or assess an Active Directory attack path, and you get generic advice that no security practitioner would follow.&lt;/p&gt;

&lt;p&gt;I built an open-source database of 611 cybersecurity skills structured for AI agent consumption. This post explains why, how, and what the skills actually look like.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Problem: AI Agents Lack Security Expertise
&lt;/h2&gt;

&lt;p&gt;When a security analyst encounters a suspicious process on a compromised Windows host, they don't think in generalities. They immediately:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Check the process tree for parent-child anomalies&lt;/li&gt;
&lt;li&gt;Run &lt;code&gt;vol3 -f memory.dmp windows.malfind&lt;/code&gt; to detect injected code&lt;/li&gt;
&lt;li&gt;Extract suspicious memory regions for YARA scanning&lt;/li&gt;
&lt;li&gt;Cross-reference process network connections with known C2 indicators&lt;/li&gt;
&lt;li&gt;Check for persistence mechanisms in registry run keys and scheduled tasks&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;An AI agent without structured security knowledge will tell you to "use a memory forensics tool" and "look for suspicious processes." That gap between generic advice and practitioner-level precision is the problem.&lt;/p&gt;

&lt;p&gt;This isn't just about knowledge -- it's about structured, actionable knowledge. AI agents need to know not just WHAT to do, but WHEN to do it, WHICH specific tool to use, and in WHAT order.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Existing Solutions Fail
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Approach&lt;/th&gt;
&lt;th&gt;Problem&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Training data (books, blogs)&lt;/td&gt;
&lt;td&gt;Unstructured, no activation triggers, no tool-specific commands&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;RAG over documentation&lt;/td&gt;
&lt;td&gt;Tool docs explain features, not workflows. No decision trees.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Prompt engineering&lt;/td&gt;
&lt;td&gt;Doesn't scale. You can't encode 611 skills in a system prompt.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Fine-tuning&lt;/td&gt;
&lt;td&gt;Expensive, needs retraining for every update, hard to audit&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Wiki/cheat sheets&lt;/td&gt;
&lt;td&gt;No machine-readable metadata, no activation conditions&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Existing skill standards&lt;/td&gt;
&lt;td&gt;Focused on human learning objectives, not agent execution&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;What's needed is a format that gives AI agents two things:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Routing information&lt;/strong&gt;: When should this skill activate? What keywords, domains, and contexts trigger it?&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Execution knowledge&lt;/strong&gt;: What exact commands, in what order, with what flags, and what to do when things go wrong?&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What agentskills.io Enables: Progressive Disclosure Architecture
&lt;/h2&gt;

&lt;p&gt;Each skill follows a two-layer architecture that mirrors how human expertise works:&lt;/p&gt;

&lt;h3&gt;
  
  
  Layer 1: YAML Frontmatter (The WHEN)
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight yaml"&gt;&lt;code&gt;&lt;span class="nn"&gt;---&lt;/span&gt;
&lt;span class="na"&gt;name&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;analyzing-memory-dumps-with-volatility&lt;/span&gt;
&lt;span class="na"&gt;description&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="pi"&gt;&amp;gt;&lt;/span&gt;
  &lt;span class="s"&gt;Analyzes RAM memory dumps from compromised systems using the Volatility&lt;/span&gt;
  &lt;span class="s"&gt;framework to identify malicious processes, injected code, network&lt;/span&gt;
  &lt;span class="s"&gt;connections, loaded modules, and extracted credentials.&lt;/span&gt;
&lt;span class="na"&gt;domain&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;cybersecurity&lt;/span&gt;
&lt;span class="na"&gt;subdomain&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;malware-analysis&lt;/span&gt;
&lt;span class="na"&gt;tags&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="pi"&gt;[&lt;/span&gt;&lt;span class="nv"&gt;malware&lt;/span&gt;&lt;span class="pi"&gt;,&lt;/span&gt; &lt;span class="nv"&gt;memory-forensics&lt;/span&gt;&lt;span class="pi"&gt;,&lt;/span&gt; &lt;span class="nv"&gt;Volatility&lt;/span&gt;&lt;span class="pi"&gt;,&lt;/span&gt; &lt;span class="nv"&gt;RAM-analysis&lt;/span&gt;&lt;span class="pi"&gt;,&lt;/span&gt; &lt;span class="nv"&gt;incident-response&lt;/span&gt;&lt;span class="pi"&gt;]&lt;/span&gt;
&lt;span class="na"&gt;version&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;1.0.0&lt;/span&gt;
&lt;span class="na"&gt;author&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;mahipal&lt;/span&gt;
&lt;span class="na"&gt;license&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;MIT&lt;/span&gt;
&lt;span class="nn"&gt;---&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This frontmatter is what gets indexed. When a user asks an AI agent to "check this memory dump for malware," the agent matches against the description and tags, identifies this skill as relevant, and loads the full body.&lt;/p&gt;

&lt;h3&gt;
  
  
  Layer 2: Markdown Body (The HOW)
&lt;/h3&gt;

&lt;p&gt;The body contains the actual procedure:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;When to Use / When Not to Use&lt;/strong&gt;: Clear activation and exclusion conditions&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Prerequisites&lt;/strong&gt;: Specific tool versions, dependencies, required inputs&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Step-by-Step Workflow&lt;/strong&gt;: Exact commands with flags, expected outputs, decision trees&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Validation Steps&lt;/strong&gt;: How to verify results&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;References&lt;/strong&gt;: MITRE ATT&amp;amp;CK techniques, NIST controls, CVE numbers&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The progressive disclosure is the key insight: the agent doesn't load 611 full skill bodies into context. It indexes the frontmatter, matches the right skill, and only then loads the detailed procedure.&lt;/p&gt;

&lt;h2&gt;
  
  
  Skill Taxonomy: 24 Subdomains, 611 Skills
&lt;/h2&gt;

&lt;p&gt;The database covers the full cybersecurity landscape:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Subdomain&lt;/th&gt;
&lt;th&gt;Skills&lt;/th&gt;
&lt;th&gt;Example Skill&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Cloud Security&lt;/td&gt;
&lt;td&gt;48&lt;/td&gt;
&lt;td&gt;Auditing AWS S3 Bucket Permissions&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Threat Intelligence&lt;/td&gt;
&lt;td&gt;43&lt;/td&gt;
&lt;td&gt;Building Threat Feed Aggregation with MISP&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Web Application Security&lt;/td&gt;
&lt;td&gt;41&lt;/td&gt;
&lt;td&gt;Exploiting Server-Side Request Forgery&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Threat Hunting&lt;/td&gt;
&lt;td&gt;35&lt;/td&gt;
&lt;td&gt;Hunting for C2 Beaconing with Frequency Analysis&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Malware Analysis&lt;/td&gt;
&lt;td&gt;34&lt;/td&gt;
&lt;td&gt;Analyzing Memory Dumps with Volatility&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Digital Forensics&lt;/td&gt;
&lt;td&gt;34&lt;/td&gt;
&lt;td&gt;Performing Timeline Reconstruction with Plaso&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;SOC Operations&lt;/td&gt;
&lt;td&gt;33&lt;/td&gt;
&lt;td&gt;Building Detection Rules with Sigma&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Network Security&lt;/td&gt;
&lt;td&gt;33&lt;/td&gt;
&lt;td&gt;Configuring Suricata for Network Monitoring&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Identity &amp;amp; Access Management&lt;/td&gt;
&lt;td&gt;33&lt;/td&gt;
&lt;td&gt;Implementing Privileged Access Management with CyberArk&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;OT/ICS Security&lt;/td&gt;
&lt;td&gt;28&lt;/td&gt;
&lt;td&gt;Detecting Modbus Protocol Anomalies&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;API Security&lt;/td&gt;
&lt;td&gt;28&lt;/td&gt;
&lt;td&gt;Testing API for Broken Object Level Authorization&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Container Security&lt;/td&gt;
&lt;td&gt;26&lt;/td&gt;
&lt;td&gt;Scanning Container Images with Grype&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Vulnerability Management&lt;/td&gt;
&lt;td&gt;24&lt;/td&gt;
&lt;td&gt;Prioritizing Vulnerabilities with CVSS Scoring&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Red Teaming&lt;/td&gt;
&lt;td&gt;24&lt;/td&gt;
&lt;td&gt;Building C2 Infrastructure with Sliver Framework&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Incident Response&lt;/td&gt;
&lt;td&gt;24&lt;/td&gt;
&lt;td&gt;Conducting Malware Incident Response&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Penetration Testing&lt;/td&gt;
&lt;td&gt;23&lt;/td&gt;
&lt;td&gt;Performing Active Directory Penetration Test&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Zero Trust Architecture&lt;/td&gt;
&lt;td&gt;17&lt;/td&gt;
&lt;td&gt;Implementing BeyondCorp Zero Trust Access Model&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Phishing Defense&lt;/td&gt;
&lt;td&gt;16&lt;/td&gt;
&lt;td&gt;Detecting Business Email Compromise with AI&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Endpoint Security&lt;/td&gt;
&lt;td&gt;16&lt;/td&gt;
&lt;td&gt;Detecting Fileless Malware Techniques&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;DevSecOps&lt;/td&gt;
&lt;td&gt;16&lt;/td&gt;
&lt;td&gt;Integrating SAST into GitHub Actions Pipeline&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Cryptography&lt;/td&gt;
&lt;td&gt;13&lt;/td&gt;
&lt;td&gt;Implementing AES Encryption for Data at Rest&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Mobile Security&lt;/td&gt;
&lt;td&gt;12&lt;/td&gt;
&lt;td&gt;Reverse Engineering Android Malware with JADX&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Ransomware Defense&lt;/td&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;Implementing Ransomware Backup Strategy&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Compliance &amp;amp; Governance&lt;/td&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;Implementing ISO 27001 Information Security Management&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  Quick Demo: How Claude Code Uses a Skill
&lt;/h2&gt;

&lt;p&gt;Here's a realistic interaction showing how an AI agent uses a skill file:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;User prompt:&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;"I have a memory dump from a potentially compromised Windows server. Can you help me analyze it for malware?"&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Without skills:&lt;/strong&gt; The agent gives a generic overview of memory forensics concepts and suggests "using Volatility."&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;With the skill loaded:&lt;/strong&gt; The agent follows the structured workflow:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# Step 1: Identify the OS profile&lt;/span&gt;
vol3 &lt;span class="nt"&gt;-f&lt;/span&gt; memory.dmp windows.info

&lt;span class="c"&gt;# Step 2: List all processes and check for anomalies&lt;/span&gt;
vol3 &lt;span class="nt"&gt;-f&lt;/span&gt; memory.dmp windows.pslist
vol3 &lt;span class="nt"&gt;-f&lt;/span&gt; memory.dmp windows.pstree

&lt;span class="c"&gt;# Step 3: Detect process injection / hollowing&lt;/span&gt;
vol3 &lt;span class="nt"&gt;-f&lt;/span&gt; memory.dmp windows.malfind

&lt;span class="c"&gt;# Step 4: Check network connections for C2&lt;/span&gt;
vol3 &lt;span class="nt"&gt;-f&lt;/span&gt; memory.dmp windows.netscan

&lt;span class="c"&gt;# Step 5: Extract suspicious DLLs&lt;/span&gt;
vol3 &lt;span class="nt"&gt;-f&lt;/span&gt; memory.dmp windows.dlllist &lt;span class="nt"&gt;--pid&lt;/span&gt; &amp;lt;suspicious_pid&amp;gt;

&lt;span class="c"&gt;# Step 6: Scan with YARA rules&lt;/span&gt;
vol3 &lt;span class="nt"&gt;-f&lt;/span&gt; memory.dmp yarascan.YaraScan &lt;span class="nt"&gt;--yara-file&lt;/span&gt; malware_rules.yar

&lt;span class="c"&gt;# Step 7: Extract credentials if needed&lt;/span&gt;
vol3 &lt;span class="nt"&gt;-f&lt;/span&gt; memory.dmp windows.hashdump
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The agent knows the exact plugin names, the order of operations, what to look for in the output, and how to pivot based on findings. That's the difference between "use Volatility" and actually using Volatility.&lt;/p&gt;

&lt;h2&gt;
  
  
  File Structure
&lt;/h2&gt;

&lt;p&gt;Each skill follows a consistent directory structure:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;skills/{skill-name}/
  SKILL.md          # Skill definition (YAML frontmatter + Markdown body)
  references/
    standards.md    # NIST, MITRE ATT&amp;amp;CK, CIS references
    workflows.md    # Detailed technical procedure reference
  scripts/
    process.py      # Practitioner helper script
  assets/
    template.md     # Filled-in checklist or report template
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The entire repository is pure Markdown and YAML. No build system, no dependencies, no runtime. Any tool that can read files can use these skills.&lt;/p&gt;

&lt;h2&gt;
  
  
  Call for Contributors
&lt;/h2&gt;

&lt;p&gt;The database is MIT licensed and open for contributions. Here's where help is most needed:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Underrepresented subdomains:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Mobile Security (12 skills) -- iOS and Android security testing, mobile malware analysis&lt;/li&gt;
&lt;li&gt;Ransomware Defense (5 skills) -- detection, response, recovery procedures&lt;/li&gt;
&lt;li&gt;Compliance &amp;amp; Governance (5 skills) -- SOC 2, HIPAA, PCI DSS, GDPR controls&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Skill improvements:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Add real-world edge cases to existing skills&lt;/li&gt;
&lt;li&gt;Update tool commands for latest versions&lt;/li&gt;
&lt;li&gt;Add detection rules (Sigma, YARA, Splunk SPL) where applicable&lt;/li&gt;
&lt;li&gt;Improve decision trees for ambiguous scenarios&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;New skill areas:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AI/ML security (adversarial ML, model security)&lt;/li&gt;
&lt;li&gt;Supply chain security&lt;/li&gt;
&lt;li&gt;Election security&lt;/li&gt;
&lt;li&gt;Healthcare-specific cybersecurity&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you write runbooks or procedure documents for your security team, you already know how to write a skill. The format is intentionally simple.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Repo:&lt;/strong&gt; &lt;a href="https://github.com/mukul975/Anthropic-Cybersecurity-Skills" rel="noopener noreferrer"&gt;github.com/mukul975/Anthropic-Cybersecurity-Skills&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The future of cybersecurity involves AI agents that understand the domain with practitioner-level depth. This database is a step toward making that real -- not by replacing security professionals, but by giving AI agents the structured knowledge to be genuinely useful assistants.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>security</category>
      <category>opensource</category>
      <category>ai</category>
    </item>
  </channel>
</rss>
