Agent Threat Intelligence Skill

$0.05 USDC / access security · SKILL.md Claude Code · Cursor · AutoGen · CrewAI · LangGraph
7-phase threat intel triage protocol — CVE feed ingestion → CVSS scoring → MITRE ATT&CK mapping → exploit prediction → incident prioritization → response triggers → remediation workflow. Pairs with security-intel-live real-time feed. One protocol covers the full threat response pipeline.

What This Skill Does

The agent-threat-intelligence-skill is a 7-phase behavioral protocol for security agents that need to consume, triage, and act on live threat intelligence. It covers CVE/OSV feed ingestion (pairing with the security-intel-live data asset), CVSS v3.1 severity scoring with a composite risk model that adds exploitability, exposure, and blast radius factors, MITRE ATT&CK technique mapping, time-to-exploit prediction, automated incident prioritization (P1 through P4 with SLA targets), response trigger patterns (alert, block CI, create ticket, pause DeFi protocol), and a structured patch management checklist.

Built for three agent use cases: CI/CD security gates (block deploys on critical CVEs), DeFi protocol monitors (detect smart contract vulnerabilities before exploitation), and infrastructure security agents (continuous asset monitoring with automated escalation).

Protocol Phases

PhaseWhat It DoesOutput
1. Feed IngestionQuery security-intel-live, deduplicate, continuous pollingThreatSignal[] with CVE/OSV IDs
2. CVSS ScoringCVSS v3.1 interpretation + composite risk (exploitability + exposure + blast radius)CompositeRiskScore with P1-P4 priority
3. MITRE ATT&CK MappingPattern-match CVE summary → ATT&CK technique + tactic + mitigationsAttackTechnique with mitigation controls
4. Exploit PredictionEstimate days-to-exploit from CVSS + POC availability + prevalence + DeFi exposureExploitPrediction with accelerators
5. Priority QueueSort all incidents by composite risk; assign P1-P4 with SLA hoursPrioritizedIncident[] sorted by risk
6. Response TriggersP1: block CI + alert Slack; P2: create ticket; DeFi critical: pause protocolResponseAction[] ready to execute
7. Remediation Workflow5-step patch checklist: verify scope → assess blast radius → patch → validate → documentDependencyPatch plan + audit trail

CVSS Severity SLA Reference

ScoreSeverityPatch SLAAgent Action
9.0–10.0Critical24 hoursBlock CI/CD · emergency alert · pause DeFi protocol
7.0–8.9High7 daysPriority ticket · notify security oncall
4.0–6.9Medium30 daysSchedule in next sprint
0.1–3.9LowNext releaseLog and monitor

Data Feed Integration

This skill is built to pair with security-intel-live — ClawMerchants' live CVE/threat intelligence feed. The feed provides:

Feed endpoint: GET https://clawmerchants.com/v1/data/security-intel-live ($0.02/query)

Code Example: Full Triage Pipeline

// Ingest → score → prioritize → respond in one pipeline
const signals = await ingestThreatFeed({ severity: 'high', minCvss: 7.0 });
const queue = await buildPriorityQueue(signals, { isInternetFacing: true, affectedSystemCount: 12 });

for (const incident of queue.filter(i => i.compositeRisk.priority === 'P1')) {
  const actions = await triggerIncidentResponse(incident, {
    slackWebhook: process.env.SLACK_WEBHOOK,
    ciPipelineId: process.env.CI_PIPELINE_ID,
  });
  console.log('P1 response actions:', actions);
}

Compatible Runtimes

Claude Code, Cursor, Codex CLI, ChatGPT, Gemini CLI, AutoGen, CrewAI, LangGraph, and any HTTP-capable agent framework.

Free preview: GET /v1/preview/agent-threat-intelligence-skill
Probe the endpoint: GET https://clawmerchants.com/v1/data/agent-threat-intelligence-skill
Browse security assets: Security Marketplace →

ClawMerchants — CVE triage AI agent | threat intelligence agent skill | MITRE ATT&CK agent integration | security incident response AI agent | CVSS scoring agent protocol | CI/CD security gate agent | exploit prediction agent