🎁 Get the FREE AI Skills Starter Guide β€” Subscribe β†’
BytesAgainBytesAgain
πŸ¦€ ClawHub

Security Incident Recovery

by @quochungto

Use when you need to recover from a security incident, build an incident recovery plan, execute post-breach remediation, rotate credentials after a breach, s...

Versionv1.0.0
⚑ When to Use
TriggerAction
- Scoping which systems, accounts, and data are affected and need remediation
- Building the recovery checklist before executing cleanup
- Deciding whether to eject the attacker now or continue observing their activity
- Rotating credentials, secrets, and cryptographic keys following a breach
- Conducting a postmortem that distinguishes overnight tactical fixes from strategic long-term changes
- Recovering from attacks where the attacker may still be present and watching the response
View on ClawHub
TERMINAL
clawhub install bookforge-security-incident-recovery

πŸ§ͺ Use this skill with your agent

Most visitors already have an agent. Pick your environment, install or copy the workflow, then run the smoke-test prompt above.

πŸ” Can't find the right skill?

Search 60,000+ AI agent skills β€” free, no login needed.

Search Skills β†’