Building an AI Skills Suite for Network Security
35+ agent skills that turn AI assistants into network security engineers — device triage, firewall audits, compliance, and cloud security.
Network security operations are ripe for the agentic AI era — structured procedures, multi-vendor complexity, and repeatability make them ideal for agent-driven automation.
I spent the last few months building netsec-skills-suite — a collection of 35+ agent skills that let AI coding assistants perform real network security operations. Device health checks, firewall policy audits, compliance assessments, incident response procedures — all structured as step-by-step procedures an agent can follow.
This post covers why I built it, how the skills are structured, and what I learned about making AI agents useful for infrastructure work.
The Problem
Network security engineering involves a lot of structured, repeatable procedures. When a router’s CPU spikes, you run the same diagnostic commands in the same order every time. When you audit a firewall ruleset, you check for the same categories of misconfigurations.
These procedures live in runbooks, tribal knowledge, and the heads of senior engineers. They’re perfect candidates for AI agent skills — structured enough to be codified, complex enough to benefit from automation.
What’s in the Suite
The skills break down into five domains:
Device Health — Platform-specific triage procedures for Cisco IOS-XE/NX-OS, Juniper JunOS, and Arista EOS. Each skill understands the platform’s CLI, has threshold tables for classifying severity, and includes decision trees for root cause analysis.
Routing Protocols — BGP, OSPF, EIGRP, and IS-IS analysis skills. These go beyond “is the neighbor up” — they diagnose path selection issues, convergence problems, and routing policy misconfigurations across multi-vendor environments.
Security Audits — Firewall policy analysis for Palo Alto, FortiGate, Check Point, and Cisco ASA/FTD. Plus vendor-agnostic ACL analysis, CIS benchmark compliance, NIST 800-53 mapping, and vulnerability assessment.
Cloud Security — VPC design analysis, security group audits, and cross-cloud security posture assessment for AWS, Azure, and GCP.
Observability — SIEM log analysis with query patterns for Splunk, ELK, and QRadar. Grafana dashboard auditing. Incident response lifecycle management.
How a Skill Works
Each skill is a SKILL.md file following the Agent Skills specification. Here’s the structure:
---
name: cisco-device-health
version: 1.0.0
description: Cisco IOS-XE and NX-OS device health check
tags: [cisco, health-check, triage]
safety_tier: read-only
---
## Procedure
### Step 1: Establish Baseline Context
Collect device identity, uptime, and software version...
### Step 2: CPU Utilization Assessment
| Metric | Normal | Warning | Critical |
|------------|--------|---------|----------|
| 5-second | <60% | 60-90% | >90% |
| 5-minute | <50% | 50-70% | >70% |
The key design decisions:
-
Safety tiers — Every skill declares whether it’s
read-only(just collects data) orread-write(may change config). The agent can enforce guardrails based on this metadata. -
Threshold tables — Hardcoded severity classifications. No guessing, no hallucination. If 5-minute CPU is at 72%, it’s critical. Period.
-
Decision trees — When a metric is abnormal, the skill tells the agent exactly what to investigate next. CPU critical + top process is BGP Router → check for route churn.
-
Multi-vendor support — Most skills cover Cisco, JunOS, and EOS with platform-specific command variations. The agent picks the right commands for the device it’s connected to.
Security Pipeline
Network security tools need to be secure themselves. Every skill goes through a multi-layer validation pipeline:
# 1. Spec validation — frontmatter schema, required fields
agentskills validate
# 2. Convention validation — safety tiers, required sections
./scripts/validate.sh
# 3. Security audit — injection detection, safety tier mismatches
python scripts/skill_security_auditor.py
# 4. VirusTotal — 70+ engine scan on every PR
# 5. OpenSSF Scorecard — weekly security posture evaluation
The custom security auditor (skill_security_auditor.py) scans for command injection patterns, prompt injection attempts, credential harvesting, obfuscation, and safety tier mismatches — where a skill claims to be read-only but contains write commands.
What I Learned
Structure beats intelligence. The skills that work best aren’t the ones with the most sophisticated logic — they’re the ones with the clearest procedures. A simple checklist with good thresholds outperforms a vague “analyze the device” instruction every time.
Safety tiers matter. The read-only / read-write distinction isn’t just metadata — it changes how operators trust the tool. When an engineer knows a skill can only run show commands, they’ll let it run against production without hesitation.
Multi-vendor is hard but worth it. Writing a single skill that handles Cisco, Juniper, and Arista triples the maintenance burden. But it also triples the value — network teams rarely run single-vendor environments.
Validation is the feature. The security pipeline isn’t overhead — it’s what makes the project usable. Nobody’s installing AI agent skills for their network devices if those skills haven’t been scanned for injection attacks.
What’s Next
The suite currently has 35+ skills across networking, security, cloud, and observability. The roadmap includes:
- Automation skills — Moving from analysis to remediation with
read-writeskills for common fixes - Playbook composition — Chaining skills into multi-step incident response workflows
- Lab validation — Testing skills against virtual network environments before recommending them for production
If you work in network security and want to try it:
npx skills add vahagn-madatyan/netsec-skills-suite
Or browse and install individual skills from ClawHub.
Give this to your agent — copy and paste this into your AI agent to get started:
Install the netsec-skills-suite: npx skills add vahagn-madatyan/netsec-skills-suite
Then use the installed skills to perform network security operations. Available skill domains:
- Device Health: cisco-device-health, juniper-device-health, arista-device-health
- Routing: bgp-analysis, ospf-analysis, eigrp-analysis, isis-analysis
- Security: palo-alto-firewall-audit, fortigate-firewall-audit, checkpoint-firewall-audit, cisco-firewall-audit, acl-rule-analysis, cis-benchmark-audit, nist-compliance-assessment, vulnerability-assessment
- Cloud: aws-networking-audit, azure-networking-audit, gcp-networking-audit, cloud-security-posture
- Observability: siem-log-analysis, network-log-analysis, monitoring-dashboard-audit, incident-response-lifecycle
Explore the interactive architecture diagrams to see how the skills are organized across domains.
The repo is open source. PRs welcome — especially for platforms I haven’t covered yet.