npx claudepluginhub plurigrid/asi --plugin asiThis skill uses the workspace's default tool permissions.
- When investigating security incidents that require analyzing threat landscape with misp
Analyzes MISP data via PyMISP for threat landscape reports: event stats, IOC type breakdowns, top threat actors/malware, MITRE techniques, and temporal trends.
Analyzes threat landscape from MISP using PyMISP: pulls events by threat level/date, computes IOC/attribute distributions, identifies top threat actors/MITRE techniques/galaxy clusters/tags, generates time-series reports.
Uses PyMISP to create, enrich, and share threat intelligence events on MISP, managing IOCs, feeds, STIX exports, and community sharing. For security assessments and incident response.
Share bugs, ideas, or general feedback.
pip install pymisppython scripts/agent.py --misp-url https://misp.local --api-key YOUR_KEY --days 90 --output landscape_report.json
Period: Last 90 days
Events analyzed: 1,247
Top threat level: High (43%)
Top attribute type: ip-dst (31%), domain (22%), sha256 (18%)
Top MITRE technique: T1566 Phishing (89 events)
Top threat actor: APT28 (34 events)