Tools Overview

7 workflow tools covering investigation, risk assessment, compliance, remediation, security overview, reporting, and cache management. Consolidated from 53 individual tools into intent-based workflows backed by 42 aggregator functions.

The 7 Workflow Tools

investigate — Investigation

Deep-dive investigation on any security topic: CVEs, threat actors, assets, endpoint events, vulnerability intelligence.

Use when: "tell me about CVE-2024-3400", "are we exposed to Lazarus Group?", "investigate this IP", "what ransomware vulns exist?", "what's happening on 10.0.0.1?"

ParameterTypeDefaultDescription
targetstr(required)CVE ID, threat actor/nation, hostname, IP address, or free-text topic
depthstr"standard""quick" (~10s) | "standard" (~20s) | "deep" (~45s, all sources + summary)
scopestr"all""all" | "vulns" | "threats" | "assets" | "edr" | "fim"
tagstr""Filter affected assets by tag
asset_groupstr""Filter by asset group
threat_typestr""RTI filter: Ransomware, Active_Attacks, Cisa_Known_Exploited_Vulns, etc.
softwarestr""Software name filter for KB search (e.g. "Apache", "OpenSSL")
daysint7Lookback window for events/vulns
limitint20Max results per data source
detailstr"standard""summary" | "standard" | "detailed"
prior_contextstr""Summary from a previous investigation for chaining
audiencestr"technical""technical" | "management" | "executive"

assess_risk — Risk Assessment

Cross-domain risk assessment covering VMs, cloud (AWS/Azure/GCP/OCI), containers, web apps, certificates, and assets.

Use when: "what's our risk?", "show me cloud risk in AWS", "top risky assets", "container vulnerabilities", "expiring certificates", "EOL systems", "risk by business unit"

ParameterTypeDefaultDescription
scopestr"all""all" | "cloud" | "containers" | "web" | "certs" | "assets"
tagstr""Filter by tag/business group
asset_groupstr""Filter by asset group
asset_idstr""Single asset deep-dive
osstr""OS filter
querystr""Hostname/asset name search
days_since_seenint0Stale asset filter (days)
days_since_scanint0Scan gap filter (days)
eol_onlyboolFalseOnly end-of-life assets
providerstr"""aws" | "azure" | "gcp" (cloud scope)
servicestr""Cloud service filter (S3, IAM, EC2, etc.)
account_idstr""Specific cloud account
per_accountboolFalseInclude per-account breakdown
image_idstr""Specific container image
app_namestr""Web application name filter
owasp_categorystr""OWASP Top 10 category
protocol_filterstr""TLS version filter
weak_ciphersboolFalseFilter for weak cipher suites
weak_onlyboolFalseOnly certificates with issues
insecure_renegotiationboolFalseFilter for insecure TLS renegotiation
include_expiredboolTrueInclude expired certificates
daysint30Time window
limitint20Max results per data source
detailstr"standard""summary" | "standard" | "detailed"
sort_bystr"trurisk""trurisk" | "severity"
breakdown_bystr"tag""tag" | "none"

check_compliance — Compliance

Compliance posture assessment: framework pass/fail rates, failing controls, risk acceptances.

Use when: "are we PCI compliant?", "compliance gaps", "show failing controls", "risk acceptances expiring", "HIPAA posture", "CIS benchmark results"

ParameterTypeDefaultDescription
frameworkstr"""PCI" | "HIPAA" | "SOC2" | "CIS" | "NIST" | "" (all)
platformstr"""windows" | "linux"
tagstr""Filter by tag
asset_groupstr""Filter by asset group
include_exceptionsboolFalseInclude vulnerability exceptions/risk acceptances
exception_statusstr"Active""Active" | "Expired" | "Pending"
vuln_typestr"""False Positive" | "Compensating Control"
days_to_expiryint30Show exceptions expiring within N days
limitint20Max results
detailstr"standard""summary" | "standard" | "detailed"

plan_remediation — Remediation

Remediation planning: patch priorities, deployment status, mitigation coverage, program gaps.

Use when: "what should we patch?", "outstanding patches", "patch deployment status", "mitigation coverage", "is there a mitigation for CVE-X?"

ParameterTypeDefaultDescription
scopestr"all""all" | "patches" | "mitigations" | "program"
tagstr""Filter by tag
asset_groupstr""Filter by asset group
platformstr"""windows" | "linux"
severitystr"""critical" | "high" | "moderate"
statusstr""Patch job status filter
qidslistNoneCheck mitigation coverage for specific QIDs
cveslistNoneCheck mitigation coverage for specific CVEs
limitint20Max results
detailstr"standard""summary" | "standard" | "detailed"

security_overview — Overview

Security briefing: daily/weekly/monthly summary with scanner health, scan status, findings, and risk trends.

Use when: "morning briefing", "what happened this week?", "security overview", "any new critical vulns?", "scanner status", "what needs attention today?"

ParameterTypeDefaultDescription
periodstr"today""today" | "week" | "month"
scopestr"all""all" | "infrastructure" | "findings" | "risk"
quickboolFalseTrue for fast snapshot (~3s), False for full briefing (~10s)
tagstr""Filter by tag
asset_groupstr""Filter by asset group
qqlstr""QQL query for ETM findings
severitystr""Finding severity filter
scan_statestr"Running,Paused,Queued,Error"Comma-separated scan states
limitint50Max results
detailstr"standard""summary" | "standard" | "detailed"

reports — Reporting

Unified report operations: list, templates, generate, status, download, delete.

ParameterTypeDefaultDescription
actionstr(required)"list" | "templates" | "generate" | "status" | "download" | "delete"
report_idstr""Report ID (for status/download/delete)
template_idstr""Template ID (for generate)
asset_group_idsstr""Comma-separated asset group IDs (for generate)
template_namestr""Filter templates by name substring
report_titlestr""Custom title for generated report
output_formatstr"pdf""pdf" | "html" | "mht" | "xml" | "csv" | "docx"

cache_status — Admin

Show cache stats or clear all caches.

ParameterTypeDefaultDescription
clearboolFalseTrue to clear all caches, False to show stats only

Response Format

All workflow tools return a unified envelope with four sections:

  • summary — headline, risk_level, key_findings
  • data — per-source results from aggregator functions
  • correlations — cross-source insights discovered during the workflow
  • actions — prioritized next steps with tool_hints for follow-up queries

Threat Intel Categories

The following Real-Time Threat Indicator (RTI) categories are available for filtering with the investigate tool's threat_type parameter:

  1. Ransomware
  2. Malware
  3. Active_Attacks
  4. Exploit_Public
  5. Easy_Exploit
  6. Wormable
  7. Cisa_Known_Exploited_Vulns
  8. Denial_of_Service
  9. Privilege_Escalation
  10. Remote_Code_Execution
  11. Predicted_High_Risk
  12. Unauthenticated_Exploitation