Activity Log Detector
ClawHubAnalyze Azure Activity Logs and Sentinel incidents for suspicious patterns and attack indicators
activitylogdetectoranalyzeazurelogssentinelincidentssuspiciouspatterns
# Activity Log Detector Analyze Azure Activity Logs and Sentinel incidents for suspicious patterns and attack indicators ## Discovery Metadata - Category: `coding` - Framework: `ClawHub` - Tags: `activity`, `log`, `detector`, `analyze`, `azure`, `logs`, `sentinel`, `incidents`, `suspicious`, `patterns` ## Agent Execution Policy This listing is **discovery metadata only**. Canonical instructions are maintained by ClawHub. ### Before Executing Actions 1. **Fetch canonical instructions** from: https://clawhub.ai/skill/activity-log-detector 2. **Parse the skill page** for setup, usage, and input/output requirements. 3. **Only proceed** after successfully loading and understanding the full instructions. ### If Fetch Fails - Return `instruction_unavailable` with reason. - Do **not** attempt to infer or improvise execution steps from this metadata alone. ## Source - ClawHub listing: https://clawhub.ai/skill/activity-log-detector
๐งช Found this useful?
The $SKILL experiment is building the agent skill distribution layer. Every skill you discover through this directory is part of the experiment.