Codex

forensics-report

Generate forensic investigation report

104 stars

Best use case

forensics-report is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

It is a strong fit for teams already working in Codex.

Generate forensic investigation report

Teams using forensics-report should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/forensics-report/SKILL.md --create-dirs "https://raw.githubusercontent.com/jmagly/aiwg/main/.agents/skills/forensics-report/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/forensics-report/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How forensics-report Compares

Feature / Agentforensics-reportStandard Approach
Platform SupportCodexLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Generate forensic investigation report

Which AI agents support this skill?

This skill is designed for Codex.

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

Related Guides

SKILL.md Source

# /forensics-report

Compile all forensic findings, analysis outputs, timelines, and IOC registers into a structured investigation report. Supports three report formats: triage summary for immediate response, full technical report for detailed review, and executive summary for leadership briefing.

## Usage

`/forensics-report <forensics-path> [options]`

## Arguments

| Argument | Required | Description |
|----------|----------|-------------|
| forensics-path | Yes | Path to investigation directory (e.g., `.aiwg/forensics/`) |
| --format | No | Report format: `triage`, `full`, `executive` (default: `full`) |
| --output | No | Output path (default: `.aiwg/forensics/reports/forensic-report.md`) |
| --include | No | Specific sections to include: `timeline`, `ioc`, `evidence`, `remediation` |
| --severity-threshold | No | Minimum finding severity to include: `low`, `medium`, `high` (default: `low`) |
| --investigator | No | Investigator name for report attribution |
| --case-id | No | Override case ID in report header |

## Behavior

When invoked, this command:

1. **Collect Investigation Artifacts**
   - Scan forensics directory for all completed outputs
   - Load: triage summary, acquisition manifest, analysis findings, timeline, IOC register
   - Identify missing sections and note gaps in coverage
   - Record report generation timestamp

2. **Severity Classification**
   - Review all findings from analysis agents
   - Classify each finding: CRITICAL, HIGH, MEDIUM, LOW, INFORMATIONAL
   - Count findings by severity for executive dashboard
   - Identify the most significant findings for report lead section

3. **Executive Summary** (all formats)
   - State incident classification (confirmed breach, suspected breach, false positive)
   - Summarize attack scope: affected systems, accounts, data
   - State attacker objectives and achieved goals (if determinable)
   - List top 3-5 critical findings
   - State immediate actions taken or required

4. **Technical Findings Section** (triage and full formats)
   - Structured finding table: ID, severity, title, affected asset, evidence reference
   - Per-finding detail: description, evidence, MITRE ATT&CK mapping, recommendation
   - Link each finding to source log lines or artifacts

5. **Timeline Section** (full format)
   - Include condensed attack timeline with key milestones
   - Reference full timeline at `timeline/incident-timeline.md`
   - State attacker dwell time and activity window

6. **IOC Section** (full format)
   - Embed IOC register summary
   - Highlight immediately actionable IOCs (IPs to block, hashes to scan)
   - Reference full IOC register for SIEM/firewall import

7. **Evidence Documentation** (full format)
   - List all collected evidence artifacts with case IDs
   - Include SHA-256 hashes for integrity verification
   - Reference chain-of-custody log
   - Note preservation status

8. **Remediation Plan**
   - Prioritized action list with severity-based ordering
   - Short-term: immediate containment and eradication steps
   - Medium-term: hardening and configuration changes
   - Long-term: detection improvements and monitoring enhancements
   - Assign suggested owner categories (security team, sysadmin, management)

9. **Report Finalization**
   - Write formatted report to output path
   - Generate PDF-ready markdown with proper heading hierarchy
   - Compute report integrity hash
   - Update investigation state to `reporting-complete`

## Report Formats

| Format | Audience | Length | Sections |
|--------|----------|--------|----------|
| `triage` | First responders | 1-2 pages | Executive summary, critical findings, immediate actions |
| `full` | Security team, legal | 10-20 pages | All sections: findings, timeline, IOCs, evidence, remediation |
| `executive` | Leadership, board | 1 page | Business impact, incident classification, remediation summary |

## Examples

### Example 1: Full report
```bash
/forensics-report .aiwg/forensics/
```

### Example 2: Triage report for immediate response
```bash
/forensics-report .aiwg/forensics/ --format triage
```

### Example 3: Executive summary
```bash
/forensics-report .aiwg/forensics/ --format executive --output .aiwg/forensics/reports/exec-summary.md
```

### Example 4: High and critical findings only
```bash
/forensics-report .aiwg/forensics/ --severity-threshold high
```

### Example 5: Include specific sections
```bash
/forensics-report .aiwg/forensics/ --include timeline,ioc,remediation
```

## Output

Artifacts are saved to `.aiwg/forensics/reports/`:

```
.aiwg/forensics/reports/
├── forensic-report.md            # Primary investigation report
├── executive-summary.md          # Executive version (if requested)
├── triage-report.md              # Triage version (if requested)
└── report-metadata.yaml          # Generation metadata and integrity hash
```

### Sample Report Structure (full format)

```markdown
# Forensic Investigation Report
Case ID: INV-2026-02-27-web01
Generated: 2026-02-27T15:01:44Z
Classification: CONFIDENTIAL

## Executive Summary

**Incident Classification**: Confirmed Breach
**Severity**: CRITICAL
**Affected Systems**: web01.internal (192.168.1.50)
**Attack Window**: 2026-02-26 22:14Z - 2026-02-27 02:15Z (4h 1m)
**Attacker Objectives**: Persistent access, C2 implant installation
**Data Impact**: Undetermined (investigation ongoing)

Key Findings:
1. [CRITICAL] Successful SSH brute force against account 'deploy'
2. [CRITICAL] C2 implant installed via cron persistence (/tmp/.update)
3. [HIGH] Active C2 beacon to 185.220.101.42:4444
4. [HIGH] Privilege escalation: deploy -> root via sudo
5. [HIGH] Attacker IP 185.220.101.42 is known Tor exit node

## Findings

| ID   | Severity | Title                          | Asset  | MITRE         |
|------|----------|--------------------------------|--------|---------------|
| F-01 | CRITICAL | SSH brute force success        | web01  | T1110.001     |
| F-02 | CRITICAL | Cron-based persistence         | web01  | T1053.003     |
| F-03 | HIGH     | Active C2 connection           | web01  | T1071.001     |
...

## Remediation Plan

### Immediate (0-24h)
- [ ] Isolate web01 from network
- [ ] Revoke 'deploy' account credentials
- [ ] Block 185.220.101.42 at perimeter firewall
- [ ] Remove /tmp/.update and associated cron entry

### Short-term (1-7 days)
- [ ] Rotate all SSH keys on affected system
- [ ] Audit all user accounts for unauthorized additions
- [ ] Review and harden SSH daemon configuration
...
```

## References

- @$AIWG_ROOT/agentic/code/frameworks/forensics-complete/agents/reporting-agent.md - Reporting Agent
- @$AIWG_ROOT/agentic/code/frameworks/forensics-complete/templates/forensic-report.md - Report template
- @$AIWG_ROOT/agentic/code/frameworks/forensics-complete/templates/executive-summary.md - Executive template
- @$AIWG_ROOT/agentic/code/frameworks/forensics-complete/commands/forensics-status.md - Investigation status

Related Skills

uat-report

104
from jmagly/aiwg

Generate UAT completion report with tool coverage matrix, pass/fail metrics, and regression detection

Codex

supply-chain-forensics

104
from jmagly/aiwg

SBOM analysis, build pipeline forensics, and dependency verification covering package integrity, build reproducibility, and CI/CD pipeline tampering

Codex

sdlc-reports

104
from jmagly/aiwg

Generate SDLC reports including iteration status, metrics dashboards, and executive summaries across phases

Codex

regression-report

104
from jmagly/aiwg

Generate comprehensive regression analysis reports combining bisect, baseline, and metrics data with actionable recommendations

Codex

provenance-report

104
from jmagly/aiwg

Generate provenance coverage dashboard and statistics

Codex

mention-report

104
from jmagly/aiwg

Generate traceability report from @-mentions

Codex

memory-forensics

104
from jmagly/aiwg

Volatility 3 memory forensics workflows covering acquisition with LiME and WinPmem, and structured analysis using Volatility 3 plugin reference

Codex

linux-forensics

104
from jmagly/aiwg

Generalized Linux incident response and forensic analysis covering Debian/Ubuntu, RHEL/CentOS/Rocky, and SUSE families

Codex

grade-report

104
from jmagly/aiwg

Generate corpus-wide GRADE quality distribution report

Codex

forensics-triage

104
from jmagly/aiwg

Quick triage investigation following RFC 3227 volatility order

Codex

forensics-timeline

104
from jmagly/aiwg

Build correlated event timeline from multiple sources

Codex

forensics-status

104
from jmagly/aiwg

Show investigation status dashboard

Codex