Skip to content

Skills Overview

A Skill is a registered, read-only analytical capability. Skills observe, detect, and assess — they never mutate cloud resources.


Skills vs Playbooks

This distinction is enforced by the platform, not by convention:

SkillPlaybook
OperationRead-only onlyWrite operations
Cloud mutationsNever permittedPermitted after approval
Human approvalNot requiredAlways required before execution
OutputFinding, Report, Triage, Audit Event ReportEvidence, execution record
Registered viaagent.yaml → skillsagent.yaml → playbooks
Tool accessreadonly_tools onlywrite_tools permitted

A Skill that attempts to use a write tool class fails ADK validation at registration time. This is a hard constraint — it cannot be overridden at runtime.


Verticals — designed vs currently shipped

The framework defines a multi-vertical skill model. Currently shipped capability (per the v2-skills repo) is narrower than the full vertical list — v2-skills contains AWS + Azure estate-scan and cost scripts, plus AWS-only monitoring scripts. The marketing-positioned vertical names below describe the design surface; verify against v2-skills/ and the analysis-agent prompts for what's currently executable.

VerticalWhat it audits (designed)Currently shipped scripts in v2-skills/
FinOpsCost anomalies, idle resources, reservation utilization, savings opportunitiescost/aws/aws_cost_report.sh, cost/azure/azure_cost_report.sh
SecOpsNetwork exposure, public ingress/egress, open S3 buckets, security group misconfigscovered by estate-scan/aws/iam-details-*.sh, s3-details-*.sh, vpc-details-*.sh and Azure equivalents
ComplianceSOC 2 TSC, GDPR, HIPAA, ISO 27001, PCI-DSSno dedicated compliance script — reasoning happens at the analysis-agent layer over estate data
IAMRole trust chains, privilege escalation paths, MFA gaps, access-key hygieneestate-scan/aws/iam-details-*.sh (AWS); no equivalent shipped Azure IAM script
Infra OpsEstate inventory, resource topology, drift detection, tagging compliancefull coverage in estate-scan/aws/ and estate-scan/azure/
DevOpsDeployment health, change risk, incident triageno dedicated script in v2-skills/; reasoning depends on analysis-agent prompts + GitHub integration via v4-integrations-agent-go
Data OpsRDS configuration, backup compliance, data residency, DB access controlspartial — estate-scan/aws/rds-details-*.sh covers RDS posture; no Azure DB script

How skills work inside the platform

Skills run through the Platform Framework formula. When a user asks a question, the gateway classifies the intent and identifies the matching skill. The platform then:

  1. Resolves the skill from the Context Engine — fetches the skill manifest, context config, tools, guardrails, and output template
  2. Assembles context — the Context Manager collects relevant estate data from local RAG; CE provides domain knowledge (advanced tier)
  3. Executes the skill — the domain agent runs the skill's tool execution plan, collecting data in declared dependency order
  4. Reasons over grounded context — the LLM receives only structured, fetched data; it does not invent facts about your estate
  5. Produces typed outputfinding, report, triage, audit_event_report, or closure_summary per the skill's output_type

Cross-domain skill composition

Skills can be composed across verticals. The platform handles this natively — a multi-domain prompt is decomposed, executed across the relevant skills in parallel, and synthesised into a single coherent response.

Example: "Are any of my overprovisioned EC2 instances also security risks?"

This crosses FinOps (idle/oversized resources) and SecOps (exposure risks). The platform resolves both skills, executes them in parallel against the same EstateView, and the Analysis Agent synthesises a joint response correlating cost and security findings.

A Finding from SecOps can also directly trigger a FinOps Plan — if remediating a public S3 bucket also recovers storage costs, both verticals produce coordinated outputs from the same event.


Skill output types

Output typeDescriptionSpawns
findingA single actionable issue on a specific resource or set of resourcesCan link to a Plan
reportA structured analysis with multiple items, version history, categoriesCan spawn Findings
triageA rapid prioritization summary for incident or multi-finding scenariosCan link to a Plan
audit_event_reportA structured record of who-did-what-when from CloudTrail or Azure Activity LogFor compliance evidence
closure_summaryA post-execution summary confirming a Finding is resolvedCloses a Finding

Skill tiers

Skills are available at two tiers:

Basic tier:

  • Skill execution with estate context (local RAG)
  • Standard tool access
  • Guardrails applied
  • Templated output

Advanced tier (adds):

  • Domain Lens documents — expert-curated knowledge base per domain (e.g. SOC 2 control mapping, FinOps optimization principles)
  • Domain Expert Graph — control relationships, cross-domain correlations
  • Deeper context resolution from the Context Engine

Tier support is declared per agent in agent.yaml → classification.tier_support.


Next steps

  • FinOps — Cost analysis and optimization
  • SecOps — Security posture and exposure
  • Compliance — SOC 2, GDPR, HIPAA, ISO, PCI-DSS
  • IAM — Access and privilege analysis
  • Writing Playbooks — Turn Findings into executable Playbooks

Escher — Agentic CloudOps by Tessell