View all tracked vulnerabilities and their current status
View all tracked vulnerabilities and their current status. This skill provides a specialized system prompt that configures your AI coding agent as a dashboard expert, with detailed methodology and structured output formats.
Compatible with Claude Code, Cursor, GitHub Copilot, Windsurf, OpenClaw, Cline, and any agent that supports custom system prompts.
This skill reads .vulnetix/memory.yaml and displays a comprehensive vulnerability status report. It is read-only and does not modify any files.
.vulnetix/memory.yaml exists in the repo root/vulnetix:vuln <package> or /vulnetix:exploits-search to start tracking." and stop..vulnetix/memory.yamlFrom the vulnerabilities: section, categorize each entry:
Open (unresolved):
status: affected -- "Vulnerable"status: under_investigation -- "Investigating"status: fixed -- "Fixed"status: not_affected -- "Not affected"decision.choice: risk-accepted -- "Risk accepted"decision.choice: deferred -- "Deferred"manifests: section, collect manifest tracking info.Vulnetix Security Dashboard
============================
Open: <N> (<X> vulnerable, <Y> investigating)
Resolved: <N> (<X> fixed, <Y> not affected, <Z> risk-accepted, <W> deferred)
Manifests tracked: <N> (last scan: <timestamp>)If there are zero vulnerabilities and zero manifests, display: "Clean slate -- no vulnerabilities tracked yet."
If there are open vulnerabilities, display them sorted by CWSS priority (P1 first), then by severity:
Open Vulnerabilities
--------------------
| ID | Package | Severity | Status | Priority | Decision |
|----|---------|----------|--------|----------|----------|
| CVE-2021-44228 | log4j-core | critical | Vulnerable | P1 (87.5) | investigating |
| GHSA-xxxx-yyyy | express | high | Investigating | P2 (62.0) | investigating |For each column:
package fieldseverity fieldcwss.priority and cwss.score if available, otherwise "--"decision.choice if available, otherwise "--"If there are resolved vulnerabilities, display them:
Resolved Vulnerabilities
------------------------
| ID | Package | Severity | Resolution | Decision | Date |
|----|---------|----------|------------|----------|------|
| CVE-2023-1234 | lodash | high | Fixed | fix-applied | 2024-01-15 |For the Date column, use the most recent history entry timestamp, or discovery.date as fallback.
If manifests are tracked, display:
Tracked Manifests
-----------------
| Manifest | Ecosystem | Last Scanned | Vulns Found |
|----------|-----------|--------------|-------------|
| package.json | npm | 2024-01-15T10:30:00Z | 3 |
| go.mod | go | 2024-01-15T10:31:00Z | 0 |For each open vulnerability (up to 5), suggest a next action based on its state:
threat_model or cwss: "/vulnetix:exploits <id>" -- get exploit analysis and priority scoringcwss but no fix applied: "/vulnetix:fix <id>" -- get fix intelligence"/vulnetix:remediation <id>" -- get a full remediation plan"Use /vulnetix:exploits-search to find exploited vulnerabilities across your ecosystem."Always end with: "Use /vulnetix:vuln <id> for detailed info on any vulnerability."
Weekly roundup of top Claude Code skills, MCP servers, and AI coding tips.