M

conducting-phishing-incident-response

by mukul975

The conducting-phishing-incident-response skill helps investigate suspicious emails, extract indicators, assess authentication, and recommend phishing response actions. It supports Incident Response workflows for message triage, credential-phishing cases, URL and attachment checks, and mailbox remediation. Use it when you need a structured guide instead of a generic prompt.

Stars0
Favorites0
Comments0
AddedMay 9, 2026
CategoryIncident Response
Install Command
npx skills add mukul975/Anthropic-Cybersecurity-Skills --skill conducting-phishing-incident-response
Curation Score

This skill scores 78/100, which means it is a solid listing candidate for directory users who need phishing incident response guidance. The repository shows a real, triggerable workflow with enough operational detail to help an agent do more than a generic prompt, though users should still expect some implementation-specific gaps before install.

78/100
Strengths
  • Strong triggerability: the frontmatter explicitly says it activates for phishing response, suspicious email reports, credential phishing, and remediation requests.
  • Real workflow depth: the docs and script cover email parsing, header/authentication checks, URL and attachment analysis, severity rating, and mailbox-wide remediation actions.
  • Helpful agent leverage: the repo includes a Python script and API reference with concrete functions and CLI usage for analyzing EML files and checking reputation services.
Cautions
  • The install path is not fully turnkey: there is no install command in SKILL.md, so users may need to wire dependencies and execution themselves.
  • Tooling appears partial: the repository references external APIs and a script, but the excerpted evidence does not show full end-to-end orchestration or documented remediation safeguards.
Overview

Overview of conducting-phishing-incident-response skill

The conducting-phishing-incident-response skill helps an agent investigate a suspicious email, extract indicators, judge likely impact, and produce response actions for phishing cases. It is best for security analysts, SOC responders, and IT admins who need a structured phishing workflow rather than a generic incident-response prompt.

This conducting-phishing-incident-response skill is most useful when you already have an .eml file, message trace details, or a report that a user clicked, entered credentials, or received a malicious email. It focuses on email-header analysis, URL and attachment checking, severity rating, and mailbox remediation steps.

What it is good at

It supports phishing-specific work such as parsing email headers, reviewing SPF/DKIM/DMARC clues, extracting URLs and attachment hashes, and using reputation sources like VirusTotal and urlscan.io. The repo also includes an executable script, so this is more than guidance text: it can support a real analysis workflow.

Where it fits

Use this conducting-phishing-incident-response skill for phishing reports, credential-phishing investigations, and message containment. Do not expect it to handle broad account-takeover investigations or business email compromise workflows where the core question is internal impersonation or fraudulent payment activity.

Why people install it

People install the conducting-phishing-incident-response skill when they want faster triage, clearer decision-making, and a repeatable sequence for response. The main value is reducing guesswork: what to inspect first, what evidence matters, and when to escalate from a single message to org-wide cleanup.

How to Use conducting-phishing-incident-response skill

Install and inspect the skill

Use the conducting-phishing-incident-response install command from your skills manager, then open skills/conducting-phishing-incident-response/SKILL.md first. For deeper context, read references/api-reference.md and scripts/agent.py; those files show the intended analysis flow and the available automation points.

Start with the right input

The conducting-phishing-incident-response usage works best when your prompt includes the email artifact and the response goal. Strong inputs look like: the .eml file, sender and recipient context, whether a user clicked or submitted credentials, and any known URLs or attachment names. Weak inputs like “check this phishing email” leave the skill guessing about scope and severity.

Convert a rough request into a usable prompt

A good conducting-phishing-incident-response guide prompt is specific about deliverables and constraints. For example: “Analyze this .eml, extract indicators, assess authentication results, identify whether the message likely bypassed filtering, and draft containment steps for mailbox purge and credential reset.” That gives the skill enough structure to produce a usable incident-response output.

Follow the repo’s workflow artifacts

The repo’s practical path is: parse the message, extract URLs and attachment hashes, check reputation, assess authentication, then rate severity and recommend action. If you are implementing it yourself, the script exposes functions such as parse_email_file(), extract_urls(), and assess_phishing_severity(), which are the best places to mirror or extend the workflow.

conducting-phishing-incident-response skill FAQ

Is conducting-phishing-incident-response only for phishing?

Yes, the conducting-phishing-incident-response skill is centered on phishing email incidents. It is not a general mail-security or full IR framework, and it should not replace a dedicated BEC, malware, or identity-compromise procedure.

Do I need API keys to use it well?

For full conducting-phishing-incident-response usage, external lookups can require keys, especially VirusTotal. If you do not have API access, the skill can still help with header analysis and response planning, but reputation checking and automated scoring will be less complete.

Is this better than a normal prompt?

Usually yes, if your goal is consistent phishing analysis. A normal prompt may summarize the email, but the conducting-phishing-incident-response skill gives a more reliable sequence: triage, indicators, authentication, severity, and containment. That matters when you need an incident record, not just an opinion.

When should I not use it?

Do not use conducting-phishing-incident-response for confirmed internal account compromise, invoice fraud, or executive impersonation where the main problem is already inside the mailbox. In those cases, use the response path designed for account takeover or BEC.

How to Improve conducting-phishing-incident-response skill

Give the skill more evidence up front

The best results come from a complete incident packet: raw .eml, message IDs, headers, screenshot of the lure, URLs, attachment names, and whether the user interacted. The more of that you provide, the less the model has to infer, which improves conducting-phishing-incident-response quality.

Ask for the output you actually need

If your team needs action, ask for action. Good requests include “list indicators of compromise,” “rate severity,” “recommend containment,” or “draft an analyst handoff summary.” That keeps the conducting-phishing-incident-response skill from producing a vague narrative when you need a response checklist.

Watch for common failure modes

The biggest misses are incomplete email artifacts, no environment context, and unclear scope. If the message was forwarded, a screenshot is not enough; if the user clicked, say whether credentials were entered; if you need org-wide cleanup, mention mailbox scope and tooling. Those details materially affect conducting-phishing-incident-response output.

Iterate after the first pass

Treat the first result as triage, then refine. If the initial analysis finds suspicious URLs or failed authentication, rerun the conducting-phishing-incident-response skill with the extracted indicators, any VirusTotal or urlscan findings, and a narrower question such as “confirm whether this is credential theft or a benign false positive.”

Ratings & Reviews

No ratings yet
Share your review
Sign in to leave a rating and comment for this skill.
G
0/10000
Latest reviews
Saving...