From vision-one-api
Monitor Kubernetes clusters, ECS clusters, and container workload security using Trend Micro Vision One. This skill provides visibility into container environments, their security posture, and runtime protection status.
npx claudepluginhub trendmicro/vision-one-skills --plugin vision-one-apiThis skill uses the workspace's default tool permissions.
Monitor Kubernetes clusters, ECS clusters, and container workload security using Trend Micro Vision One. This skill provides visibility into container environments, their security posture, and runtime protection status.
Implements Clean Architecture in Android and Kotlin Multiplatform projects: module layouts, dependency rules, UseCases, Repositories, domain models, and data layers with Room, SQLDelight, Ktor.
Enforces code quality on file edits via Plankton hooks: auto-formats, lints, Claude-powered fixes with model tiering, config protection, and legacy package manager blocks.
Enforces C++ Core Guidelines for writing, reviewing, and refactoring modern C++ code (C++17+), promoting RAII, immutability, type safety, and idiomatic practices.
Monitor Kubernetes clusters, ECS clusters, and container workload security using Trend Micro Vision One. This skill provides visibility into container environments, their security posture, and runtime protection status.
When the user asks about container security, Kubernetes, ECS, or containerized workloads, use this skill to query container infrastructure.
List Kubernetes clusters: Start with list_kubernetes_clusters to get an overview of all monitored K8s environments.
Check ECS clusters: Use list_ecs_clusters to review AWS ECS container infrastructure.
Get cluster details: Use cluster-specific detail tools to retrieve comprehensive security and configuration information.
Review namespaces: For Kubernetes, examine namespaces to understand workload organization and security policies.
Assess runtime protection: Verify that container runtime security features are enabled and functioning.
Correlate with vulnerabilities: Cross-reference container findings with CVE data for image vulnerabilities.
This skill uses the following Vision One MCP tools (all read-only):
| Tool | Purpose |
|---|---|
container_security_k8_clusters_list | List monitored Kubernetes clusters |
container_security_k8_cluster_get | Get detailed K8s cluster information |
container_security_k8_images_list | List Kubernetes images running across clusters |
| Tool | Purpose |
|---|---|
container_security_ecs_clusters_list | List monitored AWS ECS clusters |
| Tool | Purpose |
|---|---|
container_security_image_vulnerabilities_list | List container image vulnerabilities detected in K8s and ECS |
## Container Security Overview
### Kubernetes Clusters
| Cluster | Provider | Nodes | Namespaces | Protection |
|---------|----------|-------|------------|------------|
| [Name] | [EKS/AKS/GKE/On-prem] | [count] | [count] | [Enabled/Partial/Disabled] |
### ECS Clusters
| Cluster | Region | Services | Tasks | Protection |
|---------|--------|----------|-------|------------|
| [Name] | [Region] | [count] | [count] | [Enabled/Disabled] |
### Protection Summary
- Total clusters: [count]
- Fully protected: [count]
- Partially protected: [count]
- Unprotected: [count]
## Kubernetes Cluster: [Name]
**Provider**: [EKS/AKS/GKE/On-prem]
**Version**: [K8s version]
**Nodes**: [count]
### Protection Status
- Runtime protection: [Enabled/Disabled]
- Admission control: [Enabled/Disabled]
- Image scanning: [Enabled/Disabled]
### Namespaces
| Namespace | Pods | Protection Status |
|-----------|------|-------------------|
| [Name] | [count] | [Protected/Unprotected] |
### Security Findings
- Critical: [count]
- High: [count]
- Medium: [count]
- Low: [count]
## ECS Cluster: [Name]
**Region**: [AWS Region]
**Status**: [Active/Inactive]
### Services
| Service | Tasks | Status |
|---------|-------|--------|
| [Name] | [count] | [Active/Draining] |
### Protection Status
- Container protection: [Enabled/Disabled]
- Image scanning: [Enabled/Disabled]
### Resource Utilization
- CPU reservation: [%]
- Memory reservation: [%]