Cut through Dependabot noise and fix what actually matters
Prioritize vulnerability alerts by exploitability and production impact, reduce false positives, and establish an SLA-based remediation workflow.
Create a skill called "Vulnerability Alert Triage". Ask me for: - Our risk tolerance (critical services vs low-risk apps) - Current alert sources (Dependabot, npm audit, etc.) Output: - A prioritization matrix and severity SLAs - An auto-triage ruleset proposal - A remediation workflow template (PR format + verification) - A dismissal documentation template
Security tooling can overwhelm teams with alerts. This recipe introduces a triage matrix,
automation rules, and a clear developer-friendly workflow.
Replace manual release rituals with a reliable pipeline
Turn error-prone manual release work (version bumps, changelog updates, tagging, publishing) into an automated, auditable workflow with human approval gates.
Make rollbacks survivable in stateful systems
Reduce incident severity by planning roll-forward over roll-back, enforcing backward-compatible database migrations, and rehearsing recovery paths.
A calm checklist when fraud hits
Immediate steps, reporting sequences, and long-term hardening for scams and identity theft. Organized by urgency so you know what to do first.
Verify brand offers before you click anything
Screens incoming partnership offers for phishing and scam patterns: suspicious domains, attachments, fake checks, requests to "connect your account," and vague contracts. Outputs a risk rating and safe verification steps.