Security Incident Recovery by @quochungto
Use when you need to recover from a security incident, build an incident recovery plan, execute post-breach remediation, rotate credentials after a breach, s...
β‘ When to Use
Trigger Action - Scoping which systems, accounts, and data are affected and need remediation - Building the recovery checklist before executing cleanup - Deciding whether to eject the attacker now or continue observing their activity - Rotating credentials, secrets, and cryptographic keys following a breach - Conducting a postmortem that distinguishes overnight tactical fixes from strategic long-term changes - Recovering from attacks where the attacker may still be present and watching the response
βΈ Show full description clawhub install bookforge-security-incident-recoveryCopy
π§ͺ Use this skill with your agent Most visitors already have an agent. Pick your environment, install or copy the workflow, then run the smoke-test prompt above.
π Can't find the right skill?
Search 60,000+ AI agent skills β free, no login needed.
Search Skills β