Cyber Analysis
SkillSkill
Evidence-grounded SOC incident analysis. No made-up facts, ready for customer reports
About
Cyber Analysis turns raw security detections into structured, customer-ready incident write-ups in a Senior SOC Analyst voice — without the hallucinated facts that make most LLM-based alert triage unusable.
Built for MDR providers, in-house SOC teams, and OpenClaw agents running automated L1/L2 triage with human escalation. Deployed across three client SOCs where it has replaced hours of analyst write-up time per shift while keeping the quality high enough to send directly to end customers.
The skill works on Microsoft Defender, Cortex XDR, Sentinel, CrowdStrike, SentinelOne, and Splunk inputs, plus loose IOCs (hashes, IPs, URLs, domains). It produces a full incident write-up, a 4–6 sentence summary, or a one-line disposition depending on what the workflow needs — ideal for agents that escalate structured output to a human analyst only when confidence is low.
Every external artifact gets automatically enriched via VirusTotal, AbuseIPDB, IBM X-Force, URLScan, and GreyNoise, with verdicts reported verbatim — never invented. An 11-category forbidden-claims list blocks the usual LLM failure modes: fabricated VT scores, attribution guesses, malicious-by-assumption calls, and single-vendor-hit escalations.
Built on a four-step workflow — platform detection → Evidence Ledger (known vs unknown) → OSINT enrichment → confidence tagging — that prevents the model from filling in fields it wasn't given. This is the difference between a skill your team actually trusts in front of customers and one that needs a human to re-check every output.
Works in Claude.ai, Claude Code, and OpenClaw — same SKILL.md, no conversion.
Core Capabilities
- Analyze alerts from Defender
- Cortex XDR
- Sentinel
- CrowdStrike
- SentinelOne
- and Splunk
- Produce customer-ready incident write-ups in full
- short
- or one-line format
- Enrich hashes
- IPs
- URLs
- and domains via VirusTotal
- AbuseIPDB
- X-Force
- URLScan
- GreyNoise
- Write KQL
- XQL
- and SPL hunting queries on demand
- Escalate cleanly to human analysts with structured evidence when confidence is low
- Block 11 categories of hallucinated claims before they reach the customer
- Handle masked and redacted SOC input without inferring real values
Customer ratings
0 reviews
No ratings yet
- 5 star0
- 4 star0
- 3 star0
- 2 star0
- 1 star0
No reviews yet. Be the first buyer to share feedback.
One-time purchase
$29
By continuing, you agree to the Buyer Terms of Service.
Creator
OperatorFlux
Security Expert
Building AI command systems, shipping micro-SaaS, and sharing the operator playbook in public.
View creator profile →Details
- Type
- Skill
- Category
- Ops
- Price
- $29
- License
- One-time purchase
Works With
Works with OpenClaw, Claude Projects, Custom GPTs. OpenClaw-specific automation may need adaptation.
Compatible With
Any SOC-focused persona, MDR agents, incident-triage workflows, OpenClaw agents with human escalation, Claude Chat and Claude Code sessions
Required Tools
Web search (for OSINT lookups); optional VirusTotal / AbuseIPDB / IBM X-Force API keys for automated enrichment; optional MCP connectors for threat-intel platforms
Works great with
Personas that pair well with this skill.

Operator Recovery Premium Pack
Persona
Stop agent drift, recover browser failures fast, and escalate cleanly before workflows get expensive.
$49

Co-Founder in a Box
Bundle
The complete AI co-founder automation stack. 8 skills. One install guide.
$29.99

Morning, Evening & Weekly Brief Bundle
Bundle
Three autonomous briefings — morning status, nightly recap, and weekly CEO review — delivered to Telegram on a schedule you set.
$1.99