风险评分

94/100 (Very Low)

OpenClaw: benign
VirusTotal: benign
StaticScan: unknown

Activity Log Detector

作者: Anmol Nagpal
Slug:activity-log-detector
版本:1.0.0
更新时间:2026-03-04 19:04:24
风险信息

OpenClaw: benign

查看 OpenClaw 分析摘要(前 200 字预览)
The skill is an instruction-only analyzer that asks users to paste exported Azure Activity Log and Sentinel data for offline analysis — its requirements and instructions are coherent with that purpose...

[内容已截断]

VirusTotal: benign VT 报告

静态扫描: unknown

README

README 未提供

文件列表

无文件信息

下载
下载官方 ZIP
原始 JSON 数据
{
    "latestVersion": {
        "_creationTime": 1772622250031,
        "_id": "k972rfz0ytcph75xp3ebv985n58294wg",
        "changelog": "Initial release of Azure Activity Log & Sentinel Threat Detector.\n\n- Analyze exported Azure Activity Logs and Sentinel incidents for suspicious operations and attack patterns.\n- Guide users on how to export required data securely, with no credentials needed.\n- Detect and summarize high-risk events: role changes, policy deletions, failed logins, resource tampering, and more.\n- Output includes threat summaries, incident timeline, MITRE mappings, KQL detection queries, and remediation guidance.\n- All analysis is instruction-only—no direct Azure or CLI access; user data privacy emphasized.",
        "changelogSource": "auto",
        "createdAt": 1772622250031,
        "version": "1.0.0"
    },
    "owner": {
        "_creationTime": 0,
        "_id": "publishers:missing",
        "displayName": "Anmol Nagpal",
        "handle": "anmolnagpal",
        "image": "https:\/\/avatars.githubusercontent.com\/u\/4303310?v=4",
        "kind": "user",
        "linkedUserId": "kn725581p5042szc5kfkvcmsd182357s"
    },
    "ownerHandle": "anmolnagpal",
    "skill": {
        "_creationTime": 1772622250031,
        "_id": "kd75tvha1hqpf4qsqsdk6hhx89829m6f",
        "badges": [],
        "createdAt": 1772622250031,
        "displayName": "Activity Log Detector",
        "latestVersionId": "k972rfz0ytcph75xp3ebv985n58294wg",
        "ownerUserId": "kn725581p5042szc5kfkvcmsd182357s",
        "slug": "activity-log-detector",
        "stats": {
            "comments": 0,
            "downloads": 198,
            "installsAllTime": 0,
            "installsCurrent": 0,
            "stars": 0,
            "versions": 1
        },
        "summary": "Analyze Azure Activity Logs and Sentinel incidents for suspicious patterns and attack indicators",
        "tags": {
            "latest": "k972rfz0ytcph75xp3ebv985n58294wg"
        },
        "updatedAt": 1772622264065
    }
}