Google SecOps Extension¶
This folder contains the Google SecOps Extension, providing specialized skills for security operations.
Overview¶
The extension extensions/google-secops packages setup and key security workflows into skills.
These skills are Adaptive, designed to work seamlessly with:
Google SecOps Remote MCP Server (Preferred)
Local Python Tools (Fallback)
This allows the skills to function in diverse environments, automatically selecting the best available tool for the job.
The (.agent) symlink makes them available as Antigravity Agent Skills at the workspace level. You could also install/copy/symlink the skills to ~/.gemini/antigravity/skills/ to make them available globally to all workspaces.
Prerequisites¶
Install Gemini CLI (Preview):
npm install -g @google/gemini-cli@preview
Enable Skills: Ensure your
~/.gemini/settings.jsonhasexperimental.skillsenabled:{ "security": { "auth": { "selectedType": "gemini-api-key" } }, "general": { "previewFeatures": true }, "experimental": { "skills": true } }
Verify skills are enabled from the Gemini CLI prompt:
/skills list
Installation¶
To install this extension in your Gemini CLI environment:
Navigate to the project root.
Run:
gemini extensions install ./extensions/google-secops
You will be prompted for two environment variables for the MCP configuration:
PROJECT_IDSERVER_URL
Available Skills¶
1. Setup Assistant (Gemini CLI) (secops-setup-gemini-cli)¶
Trigger: “Help me set up the Gemini CLI”, “Configure Gemini CLI for SecOps”.
Function: checks for
uvand Google Cloud authentication, then guides you to add the correctsecops-hosted-mcpconfiguration to your Gemini settings (~/.gemini/config.json).
2. Setup Assistant (Antigravity) (secops-setup-antigravity)¶
Trigger: “Help me set up Antigravity”, “Configure Antigravity for SecOps”.
Function: checks for Google Cloud authentication and environment variables, then merges the correct
remote-secops-investigateandremote-secops-adminconfiguration into your Antigravity settings (~/.gemini/antigravity/mcp_config.json).
3. Alert Triage (secops-triage)¶
Trigger: “Triage alert [ID]”, “Analyze case [ID]”.
Function: Orchestrates a Tier 1 triage workflow by following the
triage_alerts.mdrunbook. It checks for duplicates, enriches entities, and provides a classification recommendation (FP/TP).
4. Investigation (secops-investigate)¶
Trigger: “Investigate case [ID]”, “Deep dive on [Entity]”.
Function: Guides deep-dive investigations using specialized runbooks (e.g., Lateral Movement, Malware).
5. Threat Hunting (secops-hunt)¶
Trigger: “Hunt for [Threat]”, “Search for TTP [ID]”.
Function: Assists in proactive threat hunting by generating hypotheses and constructing complex UDM queries for Chronicle.
How it Works¶
These skills act as Driver Agents that:
Read the standardized Runbooks in
rules_bank/run_books/.Execute the steps using the available MCP tools.
Standardize the output according to SOC best practices.
Tool Selection¶
The skills employ an Adaptive Execution strategy to ensure robustness:
Check Environment: The skill first identifies which tools are available in the current workspace.
Prioritize Remote: If the Remote MCP Server is connected, the skill uses remote tools (e.g.,
list_cases,udm_search) for maximum capability.Fallback to Local: If remote tools are unavailable, the skill automatically falls back to Local Python Tools (e.g.,
search_security_events).
For a detailed mapping of Remote vs. Local capabilities, see TOOL_MAPPING.md.
Cross-Compatibility¶
These skills are designed to be compatible with Claude Code and other AI agents. The slash_command and personas metadata in the YAML frontmatter allow other tools to index and trigger these skills effectively.
slash_command: Defines the equivalent command pattern (e.g.,/security:triage).personas: detailed which security personas (e.g.,threat_hunter) are best suited for the task.