cve

You manage CVE vulnerabilities through their complete lifecycle in a NixOS system. Based on the user's request, you will select and follow the appropriate workflow.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "cve" with this command: npx skills add fullykubed/nixos-config/fullykubed-nixos-config-cve

You manage CVE vulnerabilities through their complete lifecycle in a NixOS system. Based on the user's request, you will select and follow the appropriate workflow.

When Invoked

Gather Context: Determine the current state:

  • Has a vulnix scan been run recently?

  • Is the user asking about a specific CVE?

  • Are there existing patches to review?

Determine Intent: Analyze the user's request to identify:

  • Are they looking to find new vulnerabilities?

  • Do they have a specific CVE to fix?

  • Do they want to review existing patches?

  • Look for trigger words from the Workflow Routing table

Select Workflow: Select the appropriate workflow based on the user's intent and trigger words:

  • Does the user want to find vulnerabilities? → IdentifyCVE

  • Does the user have a specific CVE to fix? → ResolveCVE

  • Does the user want to review existing patches? → ReviewPatches

  • When in doubt: Ask the user which workflow they want to use

Execute Workflow: Report to the user "Running using the CVE skill..." You MUST read the workflow document completely before proceeding, then follow the workflow's process completely

Report Results: Summarize what was accomplished and suggest next steps

Workflow Routing

Workflow Trigger Words When to Use

IdentifyCVE "scan", "check", "find", "detect", "identify", "triage", "vulnerabilities", "run vulnix" User wants to scan their system and identify real CVE vulnerabilities (includes triaging false positives)

ResolveCVE "fix", "patch", "resolve", "whitelist", "apply", "mitigate", "CVE-XXXX-XXXXX" User has a specific CVE they want to fix via patch or whitelist

ReviewPatches "review", "audit", "check patches", "verify", "existing patches", "patch status" User wants to review existing CVE patches in the repository

File Structure

<repo>/ ├── modules/ │ ├── patches/ │ │ ├── default.nix # Imports all per-package submodules │ │ └── <package>/ │ │ ├── default.nix # NixOS module with overlay (nixpkgs, nixpkgs-unstable, or both) │ │ └── CVE-XXXX-XXXXX.patch # Individual patch files │ └── common/ │ ├── stdenv/default.nix # Custom stdenv hardening (applied to both nixpkgs sets) │ └── vulnix-scanner/ │ ├── default.nix # Vulnix scanner service + wrapper │ └── whitelist.toml # CVE whitelist (auto-applied) └── flake.nix # Imports modules

Whitelist

The system vulnix command is wrapped to automatically apply the whitelist. No need to pass -w manually - just run vulnix --system and whitelisted CVEs are filtered out.

Whitelist Organization (REQUIRED)

The whitelist file MUST be organized into clearly labeled sections:

Section Contents

HASKELL ECOSYSTEM Package name collisions with C/Rust/JS libs

JENKINS PLUGIN COLLISIONS Jenkins plugins vs CLI tools

VS CODE EXTENSION COLLISIONS VS Code extensions vs CLI tools

DIFFERENT SOFTWARE - SAME NAME Unrelated software sharing names

PLATFORM/DISTRO SPECIFIC CVEs for other platforms/distros

ALREADY PATCHED VERSIONS CVEs fixed in installed versions

EOL/LEGACY SOFTWARE Accepted risk for EOL dependencies

BUNDLED DEPENDENCIES Older libs bundled in other packages

When adding whitelist entries:

  • Add to the correct section (create if needed)

  • Document what top-level package pulls in the dependency

  • Include version info and what the CVE actually affects

  • Set until dates for accepted risks

Quick Reference

CVSS Priority Levels

Score Severity Priority

9.0-10.0 Critical Immediate

7.0-8.9 High High

4.0-6.9 Medium Moderate

0.1-3.9 Low Low

Common False Positive Patterns

Pattern Example Why It's False

Haskell vs other curl-0.4.46 (Haskell) Different software, same name

Distro-specific "Debian avahi package" NixOS uses upstream

Platform-specific "Discord macOS" Linux version differs

Already fixed Fixed in "2.4.2", have 2.4.16 Version already patched

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

agent-bom

Security scanner for AI infrastructure and supply chain — discovers MCP clients and servers, scans for CVEs, maps blast radius, generates SBOMs, runs CIS ben...

Registry SourceRecently Updated
8050Profile unavailable
Security

Security Check

🔒 Pre-installation security verification for external code and dependencies. Automated risk analysis for GitHub repos, npm packages, PyPI libraries, and she...

Registry SourceRecently Updated
1040Profile unavailable
Security

OpenClaw Vulnerability Checker

OpenClaw 安全漏洞检查与版本对比工具。用于检测当前 OpenClaw 版本存在的已知安全漏洞,对比当前版本与最新版本的差异,获取版本更新内容、风险评估和升级建议。使用场景:(1) 用户询问"检查一下我的 OpenClaw 版本有什么安全漏洞",(2) 用户说"检查 OpenClaw 安全问题",(3) 用...

Registry SourceRecently Updated
1360Profile unavailable
General

sourcegraph-search

No summary provided by upstream source.

Repository SourceNeeds Review