From vision-one-api
Manage threat intelligence data including suspicious objects, exceptions, intelligence feeds, and custom reports using Trend Micro Vision One. This skill enables proactive threat hunting, indicator management, and intelligence-driven security operations.
npx claudepluginhub trendmicro/vision-one-skills --plugin vision-one-apiThis skill uses the workspace's default tool permissions.
Manage threat intelligence data including suspicious objects, exceptions, intelligence feeds, and custom reports using Trend Micro Vision One. This skill enables proactive threat hunting, indicator management, and intelligence-driven security operations.
Implements Clean Architecture in Android and Kotlin Multiplatform projects: module layouts, dependency rules, UseCases, Repositories, domain models, and data layers with Room, SQLDelight, Ktor.
Enforces code quality on file edits via Plankton hooks: auto-formats, lints, Claude-powered fixes with model tiering, config protection, and legacy package manager blocks.
Enforces C++ Core Guidelines for writing, reviewing, and refactoring modern C++ code (C++17+), promoting RAII, immutability, type safety, and idiomatic practices.
Manage threat intelligence data including suspicious objects, exceptions, intelligence feeds, and custom reports using Trend Micro Vision One. This skill enables proactive threat hunting, indicator management, and intelligence-driven security operations.
When the user asks about threat indicators, suspicious objects, exceptions, intelligence feeds, or threat hunting, use this skill.
Suspicious Object List: Use suspicious object tools to manage known-bad indicators that should be blocked or logged across the environment.
Exception List: Use exception tools to manage false positive exclusions and trusted entities that should bypass security scanning.
Threat Intelligence Feeds: Query Trend's threat intelligence feeds for the latest IoCs, intelligence reports, and threat actor information.
Custom Intelligence Reports: Manage custom intelligence reports created from imported or collected threat data.
Threat Sweeping: Trigger searches across your environment for indicators from intelligence reports.
CRITICAL - Write operations: Adding/deleting suspicious objects and exceptions affects security enforcement. Confirm with user before making changes.
This skill uses the following Vision One MCP tools:
| Tool | Purpose | Type |
|---|---|---|
threatintel_suspicious_objects_list | List suspicious objects (domains, IPs, URLs, file hashes, emails) | Read |
threatintel_suspicious_objects_add | Add indicator to suspicious object list | Write |
threatintel_suspicious_objects_delete | Remove indicator from suspicious object list | Write |
| Tool | Purpose | Type |
|---|---|---|
threatintel_exceptions_list | List exception entries (allowed indicators) | Read |
threatintel_exceptions_add | Add indicator to exception list | Write |
threatintel_exceptions_delete | Remove indicator from exception list | Write |
| Tool | Purpose | Type |
|---|---|---|
threatintel_feeds_list | Retrieve intelligence reports with associated objects | Read |
threatintel_feed_indicators_list | List IoCs from Trend Threat Intelligence Feed | Read |
threatintel_feed_filter_definition_get | Get supported filter keys for feed queries | Read |
| Tool | Purpose | Type |
|---|---|---|
threatintel_intelligence_reports_list | List custom intelligence reports | Read |
threatintel_intelligence_report_get | Download a custom report as STIX Bundle | Read |
threatintel_intelligence_reports_delete | Delete custom intelligence reports | Write |
| Tool | Purpose | Type |
|---|---|---|
threatintel_sweep_trigger | Search environment for indicators from a report | Write |
threatintel_tasks_list | List threat intelligence tasks and jobs | Read |
threatintel_task_results_get | Get results of a threat intelligence task | Read |
All suspicious object and exception tools support these indicator types:
| Type | Description | Example |
|---|---|---|
url | Malicious URL | http://malware.example.com/payload |
domain | Malicious domain | malware.example.com |
ip | Malicious IP address | 192.168.1.100 |
senderMailAddress | Malicious email sender | attacker@phishing.com |
fileSha1 | File SHA-1 hash | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
fileSha256 | File SHA-256 hash | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
## Suspicious Objects Summary
**Total Objects**: [count]
- URLs: [count]
- Domains: [count]
- IPs: [count]
- File Hashes: [count]
- Email Addresses: [count]
### High Risk Objects
| Type | Value | Scan Action | Expires | Description |
|------|-------|-------------|---------|-------------|
| [type] | [value] | [block/log] | [date] | [description] |
### Expiring Soon (< 7 days)
[List of indicators expiring soon]
## Exception List Summary
**Total Exceptions**: [count]
### Exceptions by Type
| Type | Value | Added | Description |
|------|-------|-------|-------------|
| [type] | [value] | [date] | [reason for exception] |
## Intelligence Report: [Name]
**Report ID**: [ID]
**Created**: [Date]
**Updated**: [Date]
### Summary
[Report description]
### Indicators
- Domains: [count]
- IPs: [count]
- URLs: [count]
- File Hashes: [count]
### Related Threat Actors
[List if available]
### Recommended Actions
1. Review indicators for relevance
2. Consider adding high-confidence IoCs to suspicious object list
3. Run environment sweep if indicators are recent
## Threat Sweep Results
**Report**: [Report Name]
**Task ID**: [ID]
**Status**: [Completed/Running/Failed]
### Matches Found
| Indicator | Type | Match Location | First Seen | Last Seen |
|-----------|------|----------------|------------|-----------|
| [value] | [type] | [endpoint/network] | [date] | [date] |
### Recommended Actions
[Based on matches found]
## CONFIRMATION REQUIRED: [Operation Type]
**Operation**: [Add/Delete] [indicator type]
**Value**: [indicator value]
**List**: [Suspicious Objects/Exceptions]
### Impact
[Description of what will happen]
### Details
- Risk Level: [if applicable]
- Scan Action: [if applicable]
- Expiration: [if applicable]
**Type 'CONFIRM' to proceed or 'CANCEL' to abort:**