From vision-one-api
Investigate and analyze security alerts from Trend Micro Vision One Workbench. This skill provides read-only access to alert data for SOC analysts and incident responders.
npx claudepluginhub trendmicro/vision-one-skills --plugin vision-one-apiThis skill uses the workspace's default tool permissions.
Investigate and analyze security alerts from Trend Micro Vision One Workbench. This skill provides read-only access to alert data for SOC analysts and incident responders.
Implements Clean Architecture in Android and Kotlin Multiplatform projects: module layouts, dependency rules, UseCases, Repositories, domain models, and data layers with Room, SQLDelight, Ktor.
Enforces code quality on file edits via Plankton hooks: auto-formats, lints, Claude-powered fixes with model tiering, config protection, and legacy package manager blocks.
Enforces C++ Core Guidelines for writing, reviewing, and refactoring modern C++ code (C++17+), promoting RAII, immutability, type safety, and idiomatic practices.
Investigate and analyze security alerts from Trend Micro Vision One Workbench. This skill provides read-only access to alert data for SOC analysts and incident responders.
When the user asks about security alerts, incidents, or wants to investigate suspicious activity, use this skill to query the Workbench.
Start with alert listing: Use list_workbench_alerts to get an overview of alerts matching the user's criteria (severity, time range, status).
Get alert details: When investigating a specific alert, use get_workbench_alert with the alert ID to retrieve full context including affected entities, indicators, and timeline.
Search for patterns: Use get_workbench_alerts_list when you need to search across multiple alerts or correlate activity.
Prioritize by severity: When presenting alerts, organize by severity (critical > high > medium > low) and highlight actionable items.
Correlate entities: Look for common entities (IPs, domains, users, endpoints) across alerts to identify attack patterns.
Provide context: For each alert, explain the detection rule, potential impact, and recommended response actions.
This skill uses the following Vision One MCP tools (all read-only):
| Tool | Purpose |
|---|---|
workbench_alerts_list | List alerts with filtering by severity, status, time range |
workbench_alert_detail_get | Get detailed information for a specific alert by ID |
| Tool | Purpose |
|---|---|
workbench_observed_attack_techniques_list | List observed MITRE ATT&CK techniques detected in your environment |
When presenting alerts, use this format:
## Alert Summary
**Alert ID**: [ID]
**Severity**: [Critical/High/Medium/Low]
**Status**: [New/In Progress/Resolved]
**Detected**: [Timestamp]
### Description
[Brief description of the alert]
### Affected Entities
- Endpoints: [list]
- Users: [list]
- IPs: [list]
### Indicators of Compromise
- [IOC type]: [value]
### Recommended Actions
1. [Action item]
2. [Action item]