From communitytools
Retrieves CVSS scores, severity, CWE IDs, and descriptions for CVEs from NVD. Auto-invoked whenever CVE IDs (CVE-YYYY-NNNNN) are mentioned or discovered.
npx claudepluginhub transilienceai/communitytoolsThis skill uses the workspace's default tool permissions.
Fetch and display CVE risk scores from the National Vulnerability Database (NVD) whenever a CVE ID appears in conversation.
Researches CVE by ID via NVD API and advisories, generates safe standalone Python PoC script with standard libraries, and produces detailed markdown vulnerability report.
Gathers CVE vulnerability details from NVD, MITRE, Go VulnDB, and GHSA with fallback searches for new CVEs or incomplete web results.
Calculates CVSS v4.0 scores, interprets metric groups and vector strings, and prioritizes vulnerabilities using EPSS/CISA KEV in security operations.
Share bugs, ideas, or general feedback.
Fetch and display CVE risk scores from the National Vulnerability Database (NVD) whenever a CVE ID appears in conversation.
This skill MUST be invoked automatically whenever a CVE ID (pattern CVE-YYYY-NNNNN) is mentioned by the user or discovered during research/scanning. Do not wait for explicit invocation.
Extract CVE IDs from the user's message or tool output (regex: CVE-\d{4}-\d{4,})
Run the lookup script:
python3 tools/nvd-lookup.py CVE-XXXX-XXXXX [CVE-YYYY-YYYYY ...]
Present the results in a concise table format:
| CVE ID | Score | Severity | CWE | Description |
|---|---|---|---|---|
| CVE-XXXX-XXXXX | 9.8 | CRITICAL | CWE-79 | ... |
Continue with the user's original task — the score lookup is supplementary context, not a blocking step.
When presenting CVE risk scores inline, use this compact format:
CVE-2024-12345: 9.8 CRITICAL (CWE-79) — Remote code execution via ...
For multiple CVEs, use a markdown table.
NVD_API_KEY is set in .env, the script uses it for higher rate limits.This skill complements other skills: