From abnormal-security
Analyzes Abnormal Security email threats like BEC, phishing, malware, social engineering, spam, graymail, and credential theft. Covers threat types, attack vectors, severity assessment, remediation, and investigation workflows.
npx claudepluginhub wyre-technology/msp-claude-plugins --plugin abnormal-securityThis skill uses the workspace's default tool permissions.
Abnormal Security uses behavioral AI to detect email threats that bypass traditional secure email gateways (SEGs). Unlike signature or rule-based detection, Abnormal profiles normal communication patterns and detects deviations indicative of attacks. This skill covers threat types, attack vectors, severity assessment, remediation, and investigation workflows.
Compares coding agents like Claude Code and Aider on custom YAML-defined codebase tasks using git worktrees, measuring pass rate, cost, time, and consistency.
Designs and optimizes AI agent action spaces, tool definitions, observation formats, error recovery, and context for higher task completion rates.
Designs, implements, and audits WCAG 2.2 AA accessible UIs for Web (ARIA/HTML5), iOS (SwiftUI traits), and Android (Compose semantics). Audits code for compliance gaps.
Abnormal Security uses behavioral AI to detect email threats that bypass traditional secure email gateways (SEGs). Unlike signature or rule-based detection, Abnormal profiles normal communication patterns and detects deviations indicative of attacks. This skill covers threat types, attack vectors, severity assessment, remediation, and investigation workflows.
| Type | Description | Severity Range |
|---|---|---|
| BEC (Business Email Compromise) | Impersonation of executives or trusted contacts to request financial actions | High - Critical |
| Credential Phishing | Emails designed to harvest credentials via fake login pages | Medium - Critical |
| Malware | Emails containing malicious attachments or links to malware downloads | High - Critical |
| Extortion | Threatening emails demanding payment (sextortion, DDoS threats) | Medium - High |
| Social Engineering | Manipulation attacks using urgency, authority, or trust | Medium - Critical |
| Spam | Unsolicited bulk email | Low |
| Graymail | Marketing, newsletters, and promotional content | Low |
| Scam | Advance-fee fraud, fake invoices, lottery scams | Medium - High |
| Supply Chain Compromise | Attacks from compromised vendor or partner email accounts | Critical |
| Engine | Description | What It Detects |
|---|---|---|
| Behavioral AI | Models normal communication patterns per user/org | BEC, social engineering, impersonation |
| Content Analysis | NLP analysis of email body and intent | Urgency, financial requests, credential harvesting |
| Sender Profiling | Reputation and authentication of sender | Spoofing, domain impersonation, first-time senders |
| URL Analysis | Real-time scanning of embedded links | Credential phishing pages, malware delivery |
| Attachment Analysis | File inspection and sandboxing | Malware, ransomware payloads |
| VendorBase | Vendor risk intelligence network | Supply chain compromise, compromised vendor accounts |
| Field | Type | Description |
|---|---|---|
threatId | string | Unique threat identifier (UUID) |
abxMessageId | long | Abnormal internal message ID |
abxPortalUrl | string | Direct link to threat in Abnormal portal |
attackType | string | BEC, PHISHING, MALWARE, EXTORTION, SPAM, etc. |
attackStrategy | string | Specific attack strategy (e.g., "Invoice/Payment Fraud") |
sentTime | datetime | When the email was sent |
receivedTime | datetime | When the email was received |
attackVector | string | How the attack was delivered (Link, Attachment, Text) |
summaryInsights | string[] | AI-generated summary of why this is a threat |
| Field | Type | Description |
|---|---|---|
senderAddress | string | Sender email address |
senderName | string | Sender display name |
fromAddress | string | From header address |
fromName | string | From header display name |
replyToEmails | string[] | Reply-to addresses |
returnPath | string | Return-path/envelope sender |
senderIpAddress | string | Originating IP address |
senderDomain | string | Sender domain |
impersonatedParty | string | Who is being impersonated (if applicable) |
| Field | Type | Description |
|---|---|---|
recipientAddress | string | Primary recipient |
toAddresses | string[] | All To: addresses |
ccAddresses | string[] | All CC: addresses |
| Field | Type | Description |
|---|---|---|
remediationStatus | string | Auto-Remediated, Not Remediated, Post-Remediated |
remediationTimestamp | datetime | When remediation action was taken |
postRemediated | boolean | Whether email was remediated after delivery |
isRead | boolean | Whether the recipient read the email |
| Tool | Description | Key Parameters |
|---|---|---|
abnormal_threats_list | List detected threats with filters | pageSize, pageNumber, filter, fromDate, toDate |
abnormal_threats_get | Get detailed threat by ID | threatId |
abnormal_threats_actions | Get remediation actions for a threat | threatId |
abnormal_threats_remediate | Remediate a threat (move to junk/trash/quarantine) | threatId, action |
abnormal_threats_unremediate | Undo remediation on a threat | threatId |
List recent threats:
{
"tool": "abnormal_threats_list",
"parameters": {
"fromDate": "2026-03-20T00:00:00Z",
"toDate": "2026-03-27T00:00:00Z",
"pageSize": 25
}
}
Get threat details:
{
"tool": "abnormal_threats_get",
"parameters": {
"threatId": "184def76-3c28-4e1b-9ef0-a5abc123def4"
}
}
Remediate a threat:
{
"tool": "abnormal_threats_remediate",
"parameters": {
"threatId": "184def76-3c28-4e1b-9ef0-a5abc123def4",
"action": "QUARANTINE"
}
}
| Factor | Low | Medium | High | Critical |
|---|---|---|---|---|
| Attack Type | Spam, Graymail | Scam, Extortion | Phishing, BEC | Supply Chain, ATO |
| Recipients | 1 user | 2-10 users | 10-50 users | 50+ or executives |
| User Interaction | Not read | Read, no click | Link clicked | Credentials entered |
| Sender Profile | Known spam | Unknown external | Impersonation | Compromised internal |
| Financial Impact | None | Low value request | Wire/ACH request | Active fraud |
| Action | Description | When to Use |
|---|---|---|
QUARANTINE | Move to quarantine (user cannot access) | Confirmed malicious threats |
MOVE_TO_JUNK | Move to junk/spam folder | Spam, graymail, low-confidence threats |
DELETE | Permanently delete the message | High-severity confirmed threats |
UNREMEDIATE | Undo remediation, restore to inbox | False positives |
| Code | Message | Resolution |
|---|---|---|
| 400 | Invalid filter parameter | Check filter syntax and valid field names |
| 401 | Unauthorized | Check API token validity |
| 403 | Insufficient permissions | Token needs threat detection scope |
| 404 | Threat not found | Verify threat ID |
| 429 | Rate limited | Wait and retry with exponential backoff |