SkillDiff
← Back to browse

threat-hunting

Proactively search for security threats, vulnerabilities, and suspicious patterns in applications and infrastructure before they cause damage. Use when conducting security audits, identifying vulnerabilities, analyzing security logs, detecting suspicious patterns, investigating potential breaches, performing penetration testing, or implementing security monitoring.

By Skill Diff (@skill-diff)

Published Jan 19, 2026Updated Jan 20, 20261 views0 upvotesclaudecodexBlue TeamCybersecurityThreat DetectionSource
Loading attachments…

Install to GitHub

Create a pull request that installs this skill under .codex/skills/….

SkillDiff never pushes directly to your default branch — everything happens via PR.

Sign in to connect GitHub and create an install PR.

Threat Hunting - Security Analysis

When to use this skill

  • Conducting proactive security audits
  • Identifying vulnerabilities before exploitation
  • Analyzing security logs for threats
  • Detecting suspicious access patterns
  • Investigating potential security breaches
  • Performing penetration testing
  • Implementing security monitoring
  • Reviewing authentication logs
  • Detecting anomalous behavior
  • Identifying security misconfigurations
  • Analyzing attack surfaces
  • Building threat detection systems

When to use this skill

  • Proactive security monitoring, threat detection.
  • When working on related tasks or features
  • During development that requires this expertise

Use when: Proactive security monitoring, threat detection.

Patterns

  • Unusual network traffic
  • Failed auth attempts
  • Privilege escalation
  • Data exfiltration

Resources

Comments

Loading comments…
Loading comments…