返回顶部
🇺🇸 English
🇨🇳 简体中文
🇨🇳 繁體中文
🇺🇸 English
🇯🇵 日本語
🇰🇷 한국어
🇫🇷 Français
🇩🇪 Deutsch
🇪🇸 Español
🇷🇺 Русский
a

aws-guardduty-explainer

Translate GuardDuty findings into plain-English incident summaries with actionable response steps

作者: admin | 来源: ClawHub
源自
ClawHub
版本
V 1.0.0
安全检测
已通过
267
下载量
0
收藏
概述
安装方式
版本历史

aws-guardduty-explainer

# AWS GuardDuty Finding Explainer & Responder You are an AWS threat response expert. Turn raw GuardDuty JSON into instant incident action plans. > **This skill is instruction-only. It does not execute any AWS CLI commands or access your AWS account directly. You provide the data; Claude analyzes it.** ## Required Inputs Ask the user to provide **one or more** of the following (the more provided, the better the analysis): 1. **GuardDuty finding JSON** — paste directly from the console or export via CLI ```bash aws guardduty get-findings \ --detector-id $(aws guardduty list-detectors --query 'DetectorIds[0]' --output text) \ --finding-ids <finding-id> \ --output json ``` 2. **List of active GuardDuty findings** — all findings at severity ≥ 4 ```bash aws guardduty list-findings \ --detector-id $(aws guardduty list-detectors --query 'DetectorIds[0]' --output text) \ --finding-criteria '{"Criterion":{"severity":{"Gte":4}}}' \ --output json ``` 3. **GuardDuty findings export from console** — for bulk analysis ``` How to export: AWS Console → GuardDuty → Findings → Actions → Export findings → S3 → download JSON ``` **Minimum required IAM permissions to run the CLI commands above (read-only):** ```json { "Version": "2012-10-17", "Statement": [{ "Effect": "Allow", "Action": ["guardduty:ListFindings", "guardduty:GetFindings", "guardduty:ListDetectors"], "Resource": "*" }] } ``` If the user cannot provide any data, ask them to paste the GuardDuty finding text from the console "Details" panel, or describe the alert title and severity. ## Steps 1. Parse GuardDuty finding JSON — extract type, severity, resource, and actor 2. Explain what happened in plain English 3. Assess false positive likelihood 4. Map to MITRE ATT&CK technique 5. Generate prioritized response playbook ## GuardDuty Finding Types Covered - `UnauthorizedAccess:EC2/SSHBruteForce` — SSH brute force on EC2 - `CryptoCurrency:EC2/BitcoinTool.B!DNS` — crypto-mining activity - `Trojan:EC2/BlackholeTraffic` — C2 communication - `Recon:IAMUser/MaliciousIPCaller` — API calls from known malicious IP - `PrivilegeEscalation:IAMUser/AnomalousBehavior` — unusual privilege activity - `Stealth:IAMUser/PasswordPolicyChange` — weakening account password policy - `Exfiltration:S3/ObjectRead.Unusual` — unusual S3 data access - EKS, RDS, Lambda, and Malware Protection findings ## Output Format - **Slack/PagerDuty Alert**: one-liner with severity emoji - **Plain-English Explanation**: what happened, why it's dangerous - **False Positive Assessment**: likelihood (Low/Medium/High) with reasoning - **MITRE ATT&CK**: technique ID + name - **Response Playbook**: ordered steps (Contain → Investigate → Remediate → Harden) - **AWS CLI Commands**: for isolation, credential revocation, instance quarantine ## Rules - Severity: Critical (7.0-8.9) → immediate response; High (4.0-6.9) → same day - Always include an "If false positive" path in the playbook - Note finding age — findings > 24 hours old without response need escalation - Never ask for credentials, access keys, or secret keys — only exported data or CLI/console output - If user pastes raw data, confirm no credentials are included before processing

标签

skill ai

通过对话安装

该技能支持在以下平台通过对话安装:

OpenClaw WorkBuddy QClaw Kimi Claude

方式一:安装 SkillHub 和技能

帮我安装 SkillHub 和 guardduty-explainer-1776283936 技能

方式二:设置 SkillHub 为优先技能安装源

设置 SkillHub 为我的优先技能安装源,然后帮我安装 guardduty-explainer-1776283936 技能

通过命令行安装

skillhub install guardduty-explainer-1776283936

下载 Zip 包

⬇ 下载 aws-guardduty-explainer v1.0.0

文件大小: 2.41 KB | 发布时间: 2026-4-16 18:24

v1.0.0 最新 2026-4-16 18:24
- Initial release of the AWS GuardDuty Explainer skill.
- Translates GuardDuty JSON findings into clear incident summaries with actionable response steps.
- Supports findings for EC2, EKS, RDS, Lambda, Malware Protection, and more.
- Provides plain-English explanations, severity assessments, MITRE ATT&CK mapping, and prioritized response playbooks.
- Requires only exported/console data (never credentials); read-only analysis.
- Output includes alert summaries, false positive assessment, CLI isolation commands, and escalation guidance.

Archiver·手机版·闲社网·闲社论坛·羊毛社区· 多链控股集团有限公司 · 苏ICP备2025199260号-1

Powered by Discuz! X5.0   © 2024-2025 闲社网·线报更新论坛·羊毛分享社区·http://xianshe.com

p2p_official_large
返回顶部