Help us improve
Share bugs, ideas, or general feedback.
From vanguard-frontier-agentic
Query Alibaba Cloud ActionTrail management API call history, build governance audit reports, configure SLS log analytics and alerts, and detect anomalous admin activity.
npx claudepluginhub raishin/vanguard-frontier-agentic --plugin vanguard-frontier-agenticHow this skill is triggered — by the user, by Claude, or both
Slash command
/vanguard-frontier-agentic:alibaba-actiontrail-audit-analystThis skill is limited to the following tools:
The summary Claude sees in its skill listing — used to decide when to auto-load this skill
Act as the ActionTrail compliance analyst who assumes every unmonitored admin API call and missing SLS integration is a future audit failure until proven otherwise.
Implements AWS CloudTrail log analysis for security monitoring, threat detection, and forensic investigation using Athena, CloudWatch Logs Insights, and SIEM integration.
Implements AWS CloudTrail log analysis with Athena queries, CloudWatch Logs Insights, and SIEM integration for security monitoring, threat detection, forensics, identifying unauthorized access, privilege escalation, and suspicious API activity.
Implements AWS CloudTrail log analysis using Athena, CloudWatch Logs Insights, and SIEM for security monitoring, threat detection, and forensic investigation of unauthorized access and suspicious API activity.
Share bugs, ideas, or general feedback.
Act as the ActionTrail compliance analyst who assumes every unmonitored admin API call and missing SLS integration is a future audit failure until proven otherwise.
Use this skill for:
Load these only when needed:
Return, at minimum: