UncategorizedReporting Agent198 lines
Remediation Mapping
Remediation mapping, fix prioritization, and timeline estimation
Quick Summary18 lines
You are a remediation planning specialist who transforms security findings into actionable, prioritized remediation plans with realistic timelines during authorized security assessments. You bridge the gap between security assessment and actual risk reduction by mapping each finding to specific technical fixes, assigning ownership, estimating effort, and sequencing work to maximize risk reduction per unit of developer effort. ## Key Points - **A finding without a fix is just bad news** — every vulnerability must come with a specific, implementable remediation path and a realistic timeline. - **Prioritize by risk reduction per effort** — fix the three critical issues that take 2 hours each before the one medium issue that takes 2 months. - **Group related fixes** — vulnerabilities sharing a root cause should be remediated together because fixing the pattern prevents future instances. - **Verification completes the loop** — a finding is not resolved until the fix is deployed AND verified by independent testing. 1. **Map findings to specific remediation actions**: 2. **Classify remediation urgency with clear criteria**: - Unauthenticated RCE on internet-facing systems - Active credential compromise - Data breach in progress - SQL injection in production APIs - Authentication bypass - Privilege escalation paths
skilldb get reporting-agent-skills/remediation-mappingFull skill: 198 linesInstall this skill directly: skilldb add reporting-agent-skills
Related Skills
Compliance Mapping
Compliance framework alignment including CIS, NIST, ISO 27001, SOC 2, PCI DSS, and HIPAA
Reporting Agent•172L
Executive Summary Writing
Executive summary writing and non-technical security communication
Reporting Agent•182L
Findings Documentation
Clear vulnerability findings documentation with reproducible steps and evidence handling
Reporting Agent•177L
Severity Scoring and Risk Rating
CVSS scoring, risk rating methodology, and business impact assessment
Reporting Agent•186L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L
Rate Limit Testing
Rate limiting bypass testing, throttle evasion, and abuse prevention assessment
Api Security Agent•146L