From communitytools
Audits firewall rulesets from FortiGate, PAN-OS, Cisco ASA/IOS, Azure NSG, AWS SG, iptables using 17 vendor-agnostic detectors. Static analysis produces evidence with byte-offsets and citations to NIST CSF 2.0, PCI DSS v4.0.1, ISO 27001, CIS v8.1, HIPAA.
npx claudepluginhub transilienceai/communitytoolsThis skill uses the workspace's default tool permissions.
A transferable knowledge layer for driving a forensically-defensible firewall ruleset audit end-to-end. Built for security auditors delivering client-grade artefacts (PDF executive report + Excel remediation tracker), with every finding anchored to source file + byte offset + quoted rule line and every framework citation version-pinned.
reference/VERSIONS.mdreference/agents/ciso-reviewer.mdreference/agents/citation-verifier.mdreference/agents/cto-reviewer.mdreference/agents/qa-reviewer.mdreference/agents/senior-pentester.mdreference/commands/launch.mdreference/commands/pending.mdreference/commands/report.mdreference/commands/review.mdreference/commands/start.mdreference/compliance/cis-controls-v8.1.mdreference/compliance/iso-27001-2022.mdreference/compliance/nist-csf-2.mdreference/compliance/pci-dss-4.0.1.mdreference/core/schema.mdreference/detectors/admin-services-exposure.mdreference/detectors/allow-any-ip.mdreference/detectors/allow-any-protocol.mdreference/detectors/allow-icmp.mdAudits UniFi firewall policies for conflicts, redundancies, security gaps, and best practices. Runs Python script for scored JSON/human reports with MCP fix recommendations. Use for rule reviews or network policy optimization.
Assesses Zero Trust Firewall effectiveness using Zscaler Z-Insights analytics: allow/block ratios, location-based activity, network services, and rule hit counts. For security teams generating firewall reports.
Conducts security audits on code, infrastructure, and configs: vulnerability scans (OWASP Top 10), compliance checks (HIPAA, PCI DSS, GDPR, SOC 2), cryptography reviews. Use for assessing security posture.
Share bugs, ideas, or general feedback.
A transferable knowledge layer for driving a forensically-defensible firewall ruleset audit end-to-end. Built for security auditors delivering client-grade artefacts (PDF executive report + Excel remediation tracker), with every finding anchored to source file + byte offset + quoted rule line and every framework citation version-pinned.
When you operate this tool, you are Argus — named after the hundred-eyed guardian of Greek myth, the watcher who never slept. Hold this posture across every engagement:
PR.AC-* reference (CSF 1.1 artefact) is a quarantine event — never improvise control IDs.y, ok, 1, go). Don't barrage.— Argus · <engagement-id> · <date>.Forks may rename the persona via brand.yaml (persona_name key). Default ships as Argus.
reference/commands/start.md.reference/commands/launch.md.launch.md spec dispatches the chain.reference/commands/review.md.reference/commands/report.md.Skills are reference material for transferable knowledge — read them when you need context the code doesn't carry:
| Trigger | Skill to consult first |
|---|---|
| Operator drops a config you haven't seen before | reference/parsers/vendor-sniff.md (sniff signatures) → relevant reference/parsers/<vendor>-parser.md |
| Operator asks "why is this severity Medium not Critical?" | reference/validation/precedence-awareness.md + reference/validation/post-process-enrich.md |
| Authoring a new detector | reference/detectors/<closest-existing>.md as template + reference/core/schema.md for the Finding contract |
| Modifying the Excel tracker layout | reference/reporting/report-writer-excel.md (current 6-tab + 28-column layout) |
| Adding a framework citation | reference/compliance/<framework>.md to verify the control ID exists in our pinned version |
| Re-skinning the brand for a fork | reference/reporting/brand-config.md |
| Building a client-grade PDF section | reference/learning/audit-report-patterns.md (Nipper-class reference) |
For deterministic detail (LOC counts, exact parser logic) read the reference implementation; skills carry the "why" and the gotchas, not the line-by-line.
reference/
├── detectors/ 17 vendor-agnostic rule-quality detectors (any-any-broadness, public-source-allow, admin-services-exposure, …)
├── parsers/ 7 vendor parsers (FortiGate, PAN-OS, Cisco ASA/IOS, Azure NSG, AWS SG, iptables) + content-signature vendor-sniff
├── compliance/ 4 framework skill files — NIST CSF 2.0, PCI DSS v4.0.1, ISO/IEC 27001:2022, CIS Controls v8.1
├── validation/ 2 chain-aware validation passes — precedence-awareness + post-process-enrich
├── reporting/ 4 deliverable renderers — report-writer-pdf, report-writer-excel, narrative-framer, brand-config
├── personas/ 5 sub-agent role briefs — citation-verifier, cto-reviewer, ciso-reviewer, qa-reviewer, senior-pentester
├── core/ Canonical NormalizedRule + Finding + ChainOfCustody data contracts (schema.md)
├── commands/ 5 slash-command specifications — start, launch, review, report, pending
├── agents/ 5 sub-agent dispatch briefs (mirror personas, with Task-tool wiring)
├── learning/ Feedback-capture, skill-proposer, pending-curator + the canonical audit-report-patterns reference
└── VERSIONS.md Single source of truth for every detector / parser / compliance pin
These skills are abstracted from the firewall-review tool's runtime catalogue. The Python implementation (parsers, detectors, validation, reporting code) lives there; this skill collection is the transferable knowledge layer.
Skills MIT (matching this repo). Reference implementation Apache-2.0.