By sysdig
Sysdig's cloud security expertise, packaged as agent skills that work natively in your AI environment.
npx claudepluginhub sysdig/skills --plugin headless-cloud-securityInvestigate vulnerable images in a Sysdig-monitored environment. Fetches and ranks images by risk, lets the user choose a focus (zero-day, critical in-use, exposed, all), builds a remediation plan, optionally creates a tracking ticket (Jira / Linear / GitHub Projects) using Sysdig-side signals to determine the assignee, and hands off to /sysdig-remediate. Triggers on: "investigate", "what should I fix", "show me vulnerable images", "prioritize vulnerabilities", "/sysdig-investigate".
Interactive onboarding assistant for Sysdig Secure. Guides users through connecting AWS, GCP, or Azure cloud accounts, Kubernetes clusters, or Linux hosts to Sysdig. Presents security capabilities in plain language instead of jargon. Supports guided (interview) and autonomous (all-at-once) modes. Generates Terraform or Helm configurations, validates prerequisites, deploys, and verifies connectivity.
Author Sysdig Secure Posture custom controls (Rego) and custom policies, and emit Terraform using the Sysdig provider. API access is read-only: discover supported resource kinds, validate Rego, list policies / controls. All writes happen through Terraform, never through the API.
Remediate a vulnerable container image by fetching its Critical/High CVEs from Sysdig, resolving safe fix versions through chain analysis, and producing the minimal patch (Dockerfile base bump or dependency upgrade) against the source — opens a PR/MR on GitHub or GitLab, or emits a .patch file when the user provides a local folder. Source access is mandatory. If an existing ticket key is passed in, updates that ticket with the PR link; this skill never creates new tickets — ticket creation lives in /sysdig-investigate. Persists image-to-repo mappings, PR reviewer history, and version chains across sessions.
Investigate a runtime threat detected by Sysdig end-to-end. Surfaces the highest-priority threat, enumerates affected images, scores vulnerability vs runtime correlations on a 1-5 confidence scale, deep-dives into network blast radius or suspicious-binary VT lookups depending on the event class, and hands the case off to Jira or PagerDuty. Triggers on: "investigate runtime threat", "what is this Falco alert", runtime incident triage, SOC investigation, Falco alert analysis.
Skills and plugins to accelerate security workflows with the Orca Cloud Platform
Find security misconfigurations
Claude plugins for SentinelOne XDR - threat detection, incident response, and endpoint agent management via the Purple AI MCP server
Runtime security enforcement for AI coding agents — policy hooks, audit receipts, threat hunting, and security tools for Claude Code.
Advanced LimaCharlie skills for MSSP reporting, fleet coverage, threat intelligence, adapter management, IaC, onboarding, and HTML dashboards. Requires lc-essentials plugin.
Requires secrets
Needs API keys or credentials to function
Share bugs, ideas, or general feedback.
Editorial "Security Engineer" bundle for Claude Code from Antigravity Awesome Skills.
Own this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claimOwn this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claim