Google SecOps Extension¶
This folder contains the Google SecOps Extension, providing specialized skills for security operations.
Overview¶
The extension extensions/google-secops packages setup and key security workflows into skills.
The skills are designed to work seamlessly with:
Gemini CLI and the Google SecOps Remote MCP Server.
The (.agent) symlink makes them available as Antigravity Agent Skills at the workspace level. You could also install/copy/symlink the skills to ~/.gemini/antigravity/skills/ to make them available globally to all workspaces.
Prerequisites¶
Install Gemini CLI (Preview):
npm install -g @google/gemini-cli@preview
Enable Skills: Ensure your
~/.gemini/settings.jsonhasexperimental.skillsenabled:{ "security": { "auth": { "selectedType": "gemini-api-key" } }, "general": { "previewFeatures": true }, "experimental": { "skills": true } }
Verify skills are enabled from the Gemini CLI prompt:
/skills list
Installation¶
To install this extension in your Gemini CLI environment:
Navigate to the project root.
Run:
gemini extensions install ./extensions/google-secops
Available Skills¶
1. Setup Assistant (Gemini CLI) (secops-setup-gemini-cli)¶
Trigger: “Help me set up the Gemini CLI”, “Configure Gemini CLI for SecOps”.
Function: checks for
uvand Google Cloud authentication, then guides you to add the correctsecops-hosted-mcpconfiguration to your Gemini settings (~/.gemini/config.json).
2. Setup Assistant (Antigravity) (secops-setup-antigravity)¶
Trigger: “Help me set up Antigravity”, “Configure Antigravity for SecOps”.
Function: checks for Google Cloud authentication and environment variables, then merges the correct
remote-secops-investigateandremote-secops-adminconfiguration into your Antigravity settings (~/.gemini/antigravity/mcp_config.json).
3. Alert Triage (secops-triage)¶
Trigger: “Triage alert [ID]”, “Analyze case [ID]”.
Function: Orchestrates a Tier 1 triage workflow by following the
triage_alerts.mdrunbook. It checks for duplicates, enriches entities, and provides a classification recommendation (FP/TP).
4. Investigation (secops-investigate)¶
Trigger: “Investigate case [ID]”, “Deep dive on [Entity]”.
Function: Guides deep-dive investigations using specialized runbooks (e.g., Lateral Movement, Malware).
5. Threat Hunting (secops-hunt)¶
Trigger: “Hunt for [Threat]”, “Search for TTP [ID]”.
Function: Assists in proactive threat hunting by generating hypotheses and constructing complex UDM queries for Chronicle.
How it Works¶
These skills act as Driver Agents that:
Read the standardized Runbooks in
rules_bank/run_books/.Execute the steps using the available MCP tools (
secops,gti,secops-soar).Standardize the output according to SOC best practices.
Cross-Compatibility¶
These skills are designed to be compatible with Claude Code and other AI agents. The slash_command and personas metadata in the YAML frontmatter allow other tools to index and trigger these skills effectively.
slash_command: Defines the equivalent command pattern (e.g.,/security:triage).personas: detailed which security personas (e.g.,threat_hunter) are best suited for the task.