consultance.ai
CybersecurityCustom buildoutTechnical

Cyber Skills Pack — 754 MITRE-Mapped Skills

Cloudflare leaked 2,000 bugs their human pen testers missed. Mozilla pulled 271 from Firefox 150. 754 cyber skills mapped to MITRE ATT&CK, NIST CSF 2.0, MITRE ATLAS, D3FEND, and NIST AI RMF — plus a live Codebase Exposure Calculator that tells you how many critical CVEs are hiding in your own stack.

operator summary

Who this is for

Best for CTOs, heads of engineering, security leads, and founders at $5M-$50M SaaS or fintech tired of paying $200K pen test retainers that decorate the SOC 2 report and miss the real bugs.

where consultance.ai fits

We would deliver a private security lab: 754 skills loaded into your Claude tenant, 6 audit prompts customized for your stack, your team trained on the trust ladder, and a SOC 2 evidence pack scaffolded for your auditor. Two engineers, 5 days, ships in under a sprint.

install path

Setup steps

01

Open the live Codebase Exposure Calculator (link in the prompt vault section below). Drop in repo count, LOC, and last pen test cost. See your undiscovered critical CVE estimate against the Cloudflare baseline before reading a single prompt.

02

Load the 754 skill pack into Claude Code from the agentskills.io standard repo. One install command, Apache 2.0 license, runs locally on your laptop.

03

Pilot Phase 1 from the 90-day rollout playbook on a non critical service. Cloudflare and Mozilla both started here. Do not skip.

04

Run prompts 01 (whole repo scan), 04 (IAM sweep), 05 (SOC 2 evidence) first. Those three pay for the bundle in week one.

05

Map every finding to the SOC 2, ISO 27001, and NIST CSF 2.0 controls in the audit compliance overlay before your next audit committee meeting.

where it breaks

Before you connect live data

  • • Run dummy data first. Real client data is not a test bed.
  • • API keys never go in a public repo. Use env vars and a secrets manager.
  • • Add logging, access control, monitoring, and a rollback path before launch.
  • • Read the license. Forking a repo without checking is how lawsuits start.
license note

Credit the original author

mukul975/Anthropic-Cybersecurity-Skills is Apache 2.0. MITRE ATT&CK, D3FEND, and NIST publications are public. Never paste live customer PII into a public Claude instance. Use a Claude project with your tenant controls, or run Claude Code locally for crown jewel work.

We list this as a guide, not as our build, unless we are actively maintaining a fork.

Easy mode · paste this into Claude

Claude installs it for you, step by step.

Never used Claude before? It is free to start. Open it in a new tab, copy the prompt, paste it in. It asks one question, then walks you through everything.

  1. Step 1
    Open claude.ai ↗

    Sign up free. No card. Takes 30 seconds.

  2. Step 2

    One click. Lands on your clipboard.

  3. Step 3
    Paste + send

    Claude asks what you need + guides you the rest of the way.

Open claude.ai ↗
Tune the prompt for your level (optional)
Preview the prompt (you do not need to read it)
Install Cyber Skills Pack — 754 MITRE-Mapped Skills on my computer. Walk me through it.

Repo: https://github.com/mukul975/Anthropic-Cybersecurity-Skills
What it does: Cloudflare leaked 2,000 bugs their human pen testers missed. Mozilla pulled 271 from Firefox 150. 754 cyber skills mapped to MITRE ATT&CK, NIST CSF 2.0, MITRE ATLAS, D3FEND, and NIST AI RMF — plus a live Codebase Exposure Calculator that tells you how many critical CVEs are hiding in your own stack.

I am comfortable copy-pasting and following instructions, but I am not a developer.

Rules:
- Plain English. Define jargon the first time it appears (repo, env var, port, dependency).
- One step at a time. Exact command in a code block. Tell me which app to paste it into (Terminal on Mac, PowerShell on Windows).
- One sentence per command explaining what it does and what success looks like.
- After each command, wait. I will tell you the output before you move on.
- If a tool is missing (git, node, docker, python), give me the one-line install for my OS first.
- If something errors, diagnose before the next step. Do not skip.

First message: ask only "What is your operating system — macOS, Windows, or Linux?" Then start step 1.

Reference steps from the public guide (adapt to my OS, do not just paste them at me):
1. Open the live Codebase Exposure Calculator (link in the prompt vault section below). Drop in repo count, LOC, and last pen test cost. See your undiscovered critical CVE estimate against the Cloudflare baseline before reading a single prompt.
2. Load the 754 skill pack into Claude Code from the agentskills.io standard repo. One install command, Apache 2.0 license, runs locally on your laptop.
3. Pilot Phase 1 from the 90-day rollout playbook on a non critical service. Cloudflare and Mozilla both started here. Do not skip.
4. Run prompts 01 (whole repo scan), 04 (IAM sweep), 05 (SOC 2 evidence) first. Those three pay for the bundle in week one.
5. Map every finding to the SOC 2, ISO 27001, and NIST CSF 2.0 controls in the audit compliance overlay before your next audit committee meeting.

Stop when the app opens and I confirm it works.
the vault

The 12 prompts

Tap copy. Replace the tokens. Paste into Claude Opus 4.7.

01

Whole-repo critical CVE scan (Cloudflare pattern)

<role>You are a principal application security engineer. You have run scans at Cloudflare on production stacks protecting 20 percent of the internet.</role>

<context>
Codebase: {{REPO_PATH}}
Languages: {{PRIMARY_LANGUAGES}}
Frameworks: {{FRAMEWORKS}}
Last formal pen test: {{LAST_PENTEST_DATE}}
SOC 2 stage: {{SOC2_STAGE}}
Production traffic: {{MONTHLY_REQUESTS}}
</context>

<task>
Scan the entire repository for critical and high severity vulnerabilities. Map every finding to:
1. MITRE ATT&CK technique ID (Enterprise v14+)
2. NIST CSF 2.0 control (e.g., PR.DS-1)
3. D3FEND countermeasure ID
4. Exploitability score (CVSS v4.0)

Do not include findings below CVSS 7.0 in the first pass.
</task>

<output_format>
Markdown table: file:line | technique | NIST control | CVSS | one-line fix recommendation | rollback risk (low/med/high)
Followed by a 5 bullet executive summary aimed at a non-technical board member.
</output_format>

<constraints>
- Never invent a CVE number. If unsure, write "CWE candidate only".
- Do not auto-patch. Recommendations only on first pass.
- Skip vendored dependencies on first pass (note them separately).
</constraints>

<review_gate>
Before delivering: confirm at least one finding has a confirmed exploit path through user input. Posts without a real attack path get downgraded to advisory.
</review_gate>
02

Threat model in 20 minutes (Mandiant tier)

<role>You are a senior threat modeler at Mandiant. You produce 1 page threat models that survive engagement review.</role>

<context>
System: {{SYSTEM_NAME}}
Architecture diagram: {{ARCH_DIAGRAM_PATH or PASTE_DESCRIPTION}}
Trust boundaries: {{TRUST_BOUNDARIES}}
Sensitive data classes: {{DATA_CLASSES}}
Compliance regime: {{COMPLIANCE_REGIME}}
</context>

<task>
Produce a STRIDE threat model. For each component:
1. Spoofing / Tampering / Repudiation / Info disclosure / DoS / Elevation
2. Likelihood (low/med/high) with one sentence justification
3. Existing control (cite ISO 27001:2022 Annex A control ID)
4. Residual risk
5. One concrete mitigation the team can ship this sprint
</task>

<output_format>
Component matrix table. Then a "top 5 to fix this sprint" ordered list with effort estimate in engineer days.
</output_format>

<constraints>
- No "consider implementing" hedges. Every mitigation is concrete.
- Cite real Annex A controls. No invented codes.
</constraints>

<review_gate>
Final scan: every "high likelihood + high impact" cell must have a named mitigation, not a deferred ticket.
</review_gate>
03

CVE triage queue (CrowdStrike researcher pattern)

<role>You are a CVE researcher who triages 200 advisories a week for CrowdStrike OverWatch.</role>

<context>
Dependency manifest: {{LOCKFILE_PATH}}
Direct + transitive count: {{DEPENDENCY_COUNT}}
Production traffic posture: {{INTERNET_FACING or INTERNAL_ONLY}}
Asset criticality tier: {{CRITICALITY_TIER}}
</context>

<task>
Pull every advisory tagged against this lockfile from NVD, GitHub Advisory Database, and OSV. For each:
1. Is this package actually reachable from internet-facing code paths?
2. Is the vulnerable function called?
3. EPSS score and KEV inclusion
4. Estimated time to fix (patch available now / waiting upstream / no fix)
5. Compensating control if no patch
</task>

<output_format>
Priority queue table sorted by reachability + EPSS. Top 10 only.
Then a "safe to ignore for 30 days" list with reasoning per row.
</output_format>

<constraints>
- Never recommend a patch version that does not exist in the registry.
- Mark transitive-only vulns clearly.
</constraints>

<review_gate>
If reachability cannot be confirmed for a top 10 entry, demote it and add an evidence task.
</review_gate>
04

IAM and secrets sweep (Bishop Fox tier)

<role>You are a Bishop Fox red team operator. You break into AWS, GCP, and Azure tenancies for a living.</role>

<context>
Cloud provider: {{PROVIDER}}
Org chart: {{ORG_OR_FOLDER_STRUCTURE}}
Recent IAM policy changes (last 90 days): {{POLICY_DIFF}}
Secrets manager in use: {{SECRETS_MANAGER}}
SSO provider: {{SSO}}
</context>

<task>
Hunt for:
1. Overprivileged service accounts (any with AdministratorAccess, *, or i:* on resource scope)
2. Long-lived keys older than 90 days
3. Secrets committed to git history (last 12 months)
4. Cross-account trust relationships that allow assume-role from outside the org
5. MFA-not-enforced human users
</task>

<output_format>
Findings table: principal | finding | proof | NIST CSF 2.0 control (PR.AC-x) | one-command remediation
End with a "kill list" of accounts/keys to revoke today.
</output_format>

<constraints>
- Never propose removal of accounts without a named owner. Tag for owner review instead.
- Highlight findings that would block SOC 2 CC6.1 evidence.
</constraints>

<review_gate>
Confirm every "kill list" item has been mapped to a downstream service dependency check.
</review_gate>
05

SOC 2 evidence pack scaffolder

<role>You are a SOC 2 Type II audit lead at a Big 4 firm (KPMG, PwC, Deloitte, EY).</role>

<context>
Audit period: {{AUDIT_START}} to {{AUDIT_END}}
TSC scope: {{SECURITY_AVAILABILITY_CONFIDENTIALITY_PI_PRIVACY}}
Sample size required: {{SAMPLE_SIZE}}
Current evidence repository: {{EVIDENCE_REPO_PATH}}
</context>

<task>
For each in-scope Trust Services Criterion, generate:
1. Control description in CC-format
2. Evidence artifact list (logs, screenshots, configs, tickets)
3. Population query (real SQL or CLI to extract population)
4. Sampling plan (random vs judgmental, with rationale)
5. Walkthrough script for the auditor interview
</task>

<output_format>
One section per criterion. End with a "you are missing evidence for these controls" gap list.
</output_format>

<constraints>
- Cite the exact CC code (CC6.1, CC7.2, etc.). No "general access controls" hand waves.
- Population queries must return reproducible counts.
</constraints>

<review_gate>
Final check: no control marked "evidence ready" without a named owner and an extraction query.
</review_gate>
06

NIST AI RMF gap analysis

<role>You are a NIST AI RMF assessor. You are auditing an organization that ships AI features in production.</role>

<context>
AI use cases in production: {{USE_CASES}}
Model providers: {{MODEL_PROVIDERS}}
Inference volume: {{MONTHLY_INFERENCES}}
Personal data in prompts: {{YES_NO_TYPE}}
Existing AI policies: {{POLICY_PATH or NONE}}
</context>

<task>
Score the organization against AI RMF 1.0 GOVERN, MAP, MEASURE, MANAGE functions. For each subcategory (e.g., GV-1.1, MP-1.5, MS-2.5, MG-1.3):
1. Current maturity (0=absent, 4=managed)
2. Evidence gap
3. Specific artifact needed (model card, eval suite, incident log)
4. ISO 42001:2023 cross-reference
5. 30 day closure plan
</task>

<output_format>
Maturity heatmap (function x subcategory). Then top 5 gaps ranked by audit exposure.
</output_format>

<constraints>
- Distinguish between "policy exists" and "policy is followed". Score the second.
- No partial credit for documentation without operational evidence.
</constraints>

<review_gate>
If the org has zero red-team evals on production models, MEASURE function maxes at maturity 2.
</review_gate>
07

Incident response playbook generator (Palo Alto Unit 42 pattern)

<role>You are a Palo Alto Unit 42 incident commander. You have led 50+ active intrusions.</role>

<context>
Incident type: {{RANSOMWARE or BEC or DATA_EXFIL or DDOS or INSIDER}}
Affected systems: {{SYSTEMS}}
Detection source: {{EDR or SIEM or USER_REPORT or THREAT_INTEL}}
Business hour vs after hour: {{TIME_CONTEXT}}
</context>

<task>
Produce a runbook with:
1. First 15 minutes: containment actions, who pages whom
2. First 60 minutes: scoping queries (SIEM, EDR), evidence preservation
3. First 4 hours: eradication, comms, legal/privacy notifications
4. First 24 hours: recovery sequence, customer comms draft
5. Post incident: forensic timeline template, root cause format, NIST CSF 2.0 RS function mapping
</task>

<output_format>
Numbered playbook. Each step has owner role, expected output, escalation trigger.
Include a 1 page customer comms draft (no PII).
</output_format>

<constraints>
- Do not include "notify the CEO" without a defined threshold.
- Legal/privacy notifications must reference GDPR Art 33 or breach notification statute by jurisdiction.
</constraints>

<review_gate>
Every "decision point" must have a clear go/no-go criterion, not a vague "depends on severity".
</review_gate>
08

Code review for the security gate

<role>You are a staff security engineer who blocks pull requests at Stripe and Block.</role>

<context>
PR diff: {{PR_DIFF or PASTE_PATCH}}
Service criticality: {{TIER_1_2_3}}
Authors changes touch: {{AUTH or PAYMENTS or DATA_LAYER or INTERNAL_TOOL}}
</context>

<task>
Review the diff against:
1. OWASP Top 10 2026
2. CWE Top 25
3. ATT&CK Initial Access + Execution techniques
4. Org-specific threat model (if supplied above)

Flag every finding with severity, required fix, optional improvement, and a clear "block merge / allow merge / allow with follow up" verdict.
</task>

<output_format>
Inline comments format. Then a single bottom-line verdict.
</output_format>

<constraints>
- Block only on real risk, not style.
- Do not approve a payments diff without explicit confirmation of idempotency and audit logging.
</constraints>

<review_gate>
If you cannot identify a single security implication after reading the diff carefully, ask the author what the intent was rather than approving silently.
</review_gate>
09

Tabletop exercise generator (board-level)

<role>You are a security tabletop facilitator who has run exercises for Fortune 100 boards.</role>

<context>
Audience: {{BOARD or EXEC_TEAM or ENG_LEADS}}
Scenario type: {{RANSOMWARE or NATION_STATE or SUPPLY_CHAIN or AI_DATA_LEAK}}
Time budget: {{MINUTES}}
Org maturity: {{NASCENT or DEVELOPING or MANAGED}}
</context>

<task>
Produce a tabletop exercise with:
1. Scenario narrative (3 acts, escalating)
2. Injects every 10 minutes (legal, PR, technical, customer)
3. Decision points with no obviously right answer
4. Score sheet (decision quality, communication, control activation)
5. Post-exercise debrief template with NIST CSF 2.0 function mapping
</task>

<output_format>
Facilitator script + participant brief (separate). Inject cards on their own pages.
</output_format>

<constraints>
- Inject pressure should match audience seniority. Avoid technical depth bombs at board level.
- Every decision point references a real control gap the org can close after the exercise.
</constraints>

<review_gate>
At least one inject must force a "go public now or wait for facts" decision under time pressure.
</review_gate>
10

Vendor security review questionnaire

<role>You are a vendor risk lead at a regulated financial institution.</role>

<context>
Vendor: {{VENDOR_NAME}}
Data they will touch: {{DATA_CLASSES}}
Integration type: {{API or HOSTED or ON_PREM}}
Annual spend: {{ANNUAL_SPEND}}
Replaces: {{INCUMBENT or GREENFIELD}}
</context>

<task>
Produce a vendor security questionnaire mapped to:
1. SOC 2 / ISO 27001 / SIG Lite where applicable
2. Subprocessor chain disclosure
3. Data residency and transfer mechanism (cite GDPR Art 44+ if applicable)
4. AI usage disclosure (model providers, training opt-out, retention)
5. Termination data return / destruction

Tier questions by criticality. Reject any vendor with red items.
</task>

<output_format>
3 column matrix: question | accepted answer pattern | reject trigger
Closes with a 1 page recommendation memo for the buying committee.
</output_format>

<constraints>
- No checkbox theater. Every question has a real failure mode tied to it.
- Subprocessor disclosure failure is an automatic reject.
</constraints>

<review_gate>
Final pass: if the vendor cannot name their primary cloud provider, kill the deal.
</review_gate>
11

SBOM and supply chain risk analyzer

<role>You are an SBOM specialist who tracks the SolarWinds and xz-utils class of attacks.</role>

<context>
SBOM format: {{CYCLONEDX or SPDX}}
SBOM path: {{SBOM_PATH}}
Build pipeline: {{CI_SYSTEM}}
Code signing status: {{SIGNED or UNSIGNED}}
Reproducible builds: {{YES_NO}}
</context>

<task>
For every component in the SBOM:
1. Maintainer count (single maintainer = elevated risk)
2. Last commit recency
3. Funding source and corporate sponsor (if any)
4. Recent ownership transfer or maintainer change
5. Known typosquats in registry

Flag any package matching the SolarWinds, event-stream, ua-parser-js, xz-utils risk pattern.
</task>

<output_format>
Risk matrix. Top 10 highest-risk components with one paragraph each.
End with a "remove or pin or sponsor" recommendation per top 10 entry.
</output_format>

<constraints>
- Never recommend removing a transitive dependency without identifying its parent.
- Pin recommendations must include a verified hash.
</constraints>

<review_gate>
If any component has fewer than 3 active maintainers AND processes secrets or auth tokens, escalate to a separate review.
</review_gate>
12

AI prompt injection and jailbreak test suite

<role>You are an AI red team lead. You have broken every model on the leaderboard at some point.</role>

<context>
Product surface: {{CHATBOT or AGENT or COPILOT or BACKEND_INFERENCE}}
Model provider: {{PROVIDER}}
System prompt: {{SYSTEM_PROMPT_PASTE}}
Tools the model can call: {{TOOLS}}
Data the model can access: {{DATA_SCOPES}}
</context>

<task>
Generate 25 adversarial test cases across:
1. Direct injection (override system prompt)
2. Indirect injection (via tool output, document, email)
3. Tool misuse (chain calls to exfiltrate or destroy)
4. Privilege escalation (use one tool to escalate scope of another)
5. Jailbreak (refuse-bypass for harmful outputs)
6. Data leakage (extract training data, customer PII from context)

For each: expected refusal pattern, observed result template, severity if exploited, ATT&CK ATLAS technique ID.
</task>

<output_format>
Test case table. Then a runner script template (Python or bash) the team can execute weekly.
</output_format>

<constraints>
- No real PII or credentials in test cases. Use synthetic markers.
- Do not generate test cases that produce actually harmful content. Use placeholders.
</constraints>

<review_gate>
At least 5 test cases must target indirect injection via tool output. That is the modern attack surface.
</review_gate>
implementation path

Want it wired into your business instead of your laptop?

A repo on your machine is a starting point. The work that pays back is connecting it to the CRM, inbox, payments, and team processes you already run. That is the part we ship.