detection-yaml-engineer
CommunityGenerate & validate SIEM detection rules.
AuthorMHaggis
Version1.0.0
Installs0
System Documentation
What problem does it solve?
This Skill streamlines the creation and validation of security detection rules across multiple SIEM platforms, ensuring consistency, compliance, and optimal performance.
Core Features & Use Cases
- Multi-Platform Rule Generation: Creates detection rules in YAML (Splunk), Sigma, TOML (Elastic), and KQL (Sentinel) formats.
- Validation Assistance: Provides guidance on common mistakes and validation commands for each platform.
- Use Case: A security analyst needs to create a new detection rule for a specific MITRE ATT&CK technique. They can use this Skill to generate a template in their target SIEM's format, ensuring it adheres to repository standards and includes necessary metadata like MITRE mappings and test cases.
Quick Start
Use the detection-yaml-engineer skill to generate a Splunk security_content YAML template for the MITRE technique T1059.001.
Dependency Matrix
Required Modules
None requiredComponents
references
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: detection-yaml-engineer Download link: https://github.com/MHaggis/Security-Detections-MCP/archive/main.zip#detection-yaml-engineer Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.