Google SecOps Extension

This folder contains the Google SecOps Extension, providing specialized skills for security operations.

Overview

The extension extensions/google-secops packages setup and key security workflows into skills.

These skills are Adaptive, designed to work seamlessly with:

This allows the skills to function in diverse environments, automatically selecting the best available tool for the job.

The (.agent) symlink makes them available as Antigravity Agent Skills at the workspace level. You could also install/copy/symlink the skills to ~/.gemini/antigravity/skills/ to make them available globally to all workspaces.

Prerequisites

  1. Install Gemini CLI (Preview):

    npm install -g @google/gemini-cli@preview
    
  2. Enable Skills: Ensure your ~/.gemini/settings.json has experimental.skills enabled:

    {
      "security": {
        "auth": {
          "selectedType": "gemini-api-key"
        }
      },
      "general": {
        "previewFeatures": true
      },
      "experimental": {
        "skills": true
      }
    }
    

Verify skills are enabled from the Gemini CLI prompt:

/skills list

Installation

To install this extension in your Gemini CLI environment:

  1. Navigate to the project root.

  2. Run:

    gemini extensions install ./extensions/google-secops
    

You will be prompted for two environment variables for the MCP configuration:

  1. PROJECT_ID

  2. SERVER_URL

Available Skills

1. Setup Assistant (Gemini CLI) (secops-setup-gemini-cli)

  • Trigger: “Help me set up the Gemini CLI”, “Configure Gemini CLI for SecOps”.

  • Function: checks for uv and Google Cloud authentication, then guides you to add the correct secops-hosted-mcp configuration to your Gemini settings (~/.gemini/config.json).

2. Setup Assistant (Antigravity) (secops-setup-antigravity)

  • Trigger: “Help me set up Antigravity”, “Configure Antigravity for SecOps”.

  • Function: checks for Google Cloud authentication and environment variables, then merges the correct remote-secops-investigate and remote-secops-admin configuration into your Antigravity settings (~/.gemini/antigravity/mcp_config.json).

3. Alert Triage (secops-triage)

  • Trigger: “Triage alert [ID]”, “Analyze case [ID]”.

  • Function: Orchestrates a Tier 1 triage workflow by following the triage_alerts.md runbook. It checks for duplicates, enriches entities, and provides a classification recommendation (FP/TP).

4. Investigation (secops-investigate)

  • Trigger: “Investigate case [ID]”, “Deep dive on [Entity]”.

  • Function: Guides deep-dive investigations using specialized runbooks (e.g., Lateral Movement, Malware).

5. Threat Hunting (secops-hunt)

  • Trigger: “Hunt for [Threat]”, “Search for TTP [ID]”.

  • Function: Assists in proactive threat hunting by generating hypotheses and constructing complex UDM queries for Chronicle.

How it Works

These skills act as Driver Agents that:

  1. Read the standardized Runbooks in rules_bank/run_books/.

  2. Execute the steps using the available MCP tools.

  3. Standardize the output according to SOC best practices.

Tool Selection

The skills employ an Adaptive Execution strategy to ensure robustness:

  1. Check Environment: The skill first identifies which tools are available in the current workspace.

  2. Prioritize Remote: If the Remote MCP Server is connected, the skill uses remote tools (e.g., list_cases, udm_search) for maximum capability.

  3. Fallback to Local: If remote tools are unavailable, the skill automatically falls back to Local Python Tools (e.g., search_security_events).

For a detailed mapping of Remote vs. Local capabilities, see TOOL_MAPPING.md.

Cross-Compatibility

These skills are designed to be compatible with Claude Code and other AI agents. The slash_command and personas metadata in the YAML frontmatter allow other tools to index and trigger these skills effectively.

  • slash_command: Defines the equivalent command pattern (e.g., /security:triage).

  • personas: detailed which security personas (e.g., threat_hunter) are best suited for the task.

References