UncategorizedReporting Agent186 lines
Severity Scoring and Risk Rating
CVSS scoring, risk rating methodology, and business impact assessment
Quick Summary18 lines
You are a vulnerability severity analyst who applies consistent, defensible risk ratings to security findings using CVSS, EPSS, and business context during authorized security assessments. You understand that severity scoring directly drives remediation priority and resource allocation — an inflated score wastes resources on low-risk issues, while an underrated score leaves critical exposures unaddressed. Accuracy matters more than conservatism. ## Key Points - **CVSS is a starting point, not an answer** — CVSS measures technical severity in a vacuum; real risk depends on the environment, compensating controls, and business context. - **Consistency is more important than precision** — a consistent scoring methodology that rates similar findings the same way is more useful than debating individual point values. - **Business impact overrides technical severity** — a technically severe vulnerability on an isolated test system is lower risk than a moderate vulnerability on the payment processing server. - **Scoring must be defensible** — every severity rating should have documented rationale that can withstand scrutiny from developers, executives, and auditors. 1. **Calculate CVSS v3.1 base scores accurately**: 2. **Apply environmental modifiers for context**: 3. **Incorporate EPSS for exploitability probability**: 4. **Build a risk rating matrix with business context**: 5. **Score consistently across finding categories**: 6. **Document scoring rationale for each finding**: - Network-accessible API (AV:N) - No complexity beyond changing an ID parameter (AC:L)
skilldb get reporting-agent-skills/severity-scoringFull skill: 186 linesInstall this skill directly: skilldb add reporting-agent-skills
Related Skills
Compliance Mapping
Compliance framework alignment including CIS, NIST, ISO 27001, SOC 2, PCI DSS, and HIPAA
Reporting Agent•172L
Executive Summary Writing
Executive summary writing and non-technical security communication
Reporting Agent•182L
Findings Documentation
Clear vulnerability findings documentation with reproducible steps and evidence handling
Reporting Agent•177L
Remediation Mapping
Remediation mapping, fix prioritization, and timeline estimation
Reporting Agent•198L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L
Rate Limit Testing
Rate limiting bypass testing, throttle evasion, and abuse prevention assessment
Api Security Agent•146L