Procux AI Skills Catalog
65 executable AI skills run on top of your 16 AI executives. Each skill is a reviewed, versioned playbook — not a prompt — so results are consistent across tenants, auditable, and wired into the Procux skill runtime.
CISO Security Kit
Security operations catalog covering AppSec (OWASP A01–A10), cloud audit, compliance, DFIR, supply chain, and threat hunting.
34 skills · 6 categories
AppSec · 10
- Authentication & Session FailuresAI CISO
OWASP Top 10 A07 — review authentication and session management flaws: broken logout, session fixation, weak credentials, MFA bypass.
- Broken Access ControlAI CISO
OWASP Top 10 A01 — review authorization flaws (BOLA, IDOR, privilege escalation, missing role checks).
- Cryptographic FailuresAI CISO
OWASP Top 10 A02 — audit cryptography usage: weak algorithms, key management, TLS config, at-rest / in-transit encryption gaps.
- Injection (SQLi / XSS)AI CISO
OWASP Top 10 A03 — SQL injection, cross-site scripting, command injection, and untrusted input handling.
- Insecure DesignAI CISO
OWASP Top 10 A04 — threat model review for architecture-level security flaws and missing defense in depth.
- Security Logging & MonitoringAI CISO
OWASP Top 10 A09 — audit logging, alerting, and detection coverage for security-relevant events.
- Security MisconfigurationAI CISO
OWASP Top 10 A05 — hardening baseline review: default credentials, verbose errors, open ports, cloud service exposure.
- Software & Data Integrity FailuresAI CISO
OWASP Top 10 A08 — supply chain and update integrity, signed artifacts, deserialization flaws.
- SSRF & XXEAI CISO
OWASP Top 10 A10 — server-side request forgery and XML external entity flaws in parsers and network calls.
- Vulnerable & Outdated ComponentsAI CISO
OWASP Top 10 A06 — dependency inventory, CVE scan, lifecycle review for third-party components.
Cloud · 5
- API Gateway Access AnalysisAI CISO
Review API gateway authentication, rate limits, throttling, and access logs across AWS, Azure, and GCP providers.
- AWS CloudTrail Threat HuntingAI CISO
Detection hunts over CloudTrail management + data events: privilege escalation, impossible travel, key exfiltration.
- Azure Activity Log AnalysisAI CISO
Azure control-plane activity log review for suspicious RBAC changes, resource tampering, and diagnostic drift.
- GCP Audit Log ReviewAI CISO
Google Cloud audit log triage: IAM changes, service account abuse, data access events, VPC flow anomalies.
- Kubernetes Audit LogsAI CISO
K8s control-plane audit log hunting for exec into pods, service-account token abuse, and privileged workload creation.
Compliance · 4
- Data Breach 72h Notification PlaybookAI CISO, AI CLO
GDPR / KVKK 72-hour breach notification workflow: scoping, evidence capture, regulator submission template.
- DPO Workflow PlaybookAI CISO, AI CLO
Data Protection Officer operating playbook: DSAR handling, DPIA cadence, records of processing, vendor review.
- Technical & Organizational Measures ReportAI CISO, AI CLO
Generate the TOM (Technical and Organizational Measures) report required under GDPR Article 32 and KVKK Article 12.
- VERBIS Registration CheckAI CISO, AI CLO
Turkish KVKK VERBIS data controller registry readiness check and filing workflow.
DFIR · 6
- Incident Timeline ReconstructionAI CISO
Correlate logs, alerts, and artifacts to build a defensible incident timeline for executive briefing and regulator disclosure.
- Linux Artifact CollectionAI CISO
Live and dead-box Linux artifact triage: bash history, systemd units, /tmp, cron, lastlog, suid binaries.
- LSASS Credential Dumping DetectionAI CISO
Detect Mimikatz / comsvcs / procdump patterns against LSASS via Sysmon event IDs 10 and 8.
- macOS Forensic TriageAI CISO
macOS live triage: launchd persistence, TCC database inspection, quarantine xattrs, unified logs.
- Memory Forensics BasicsAI CISO
Volatility / Rekall based memory triage: process tree, injected code, network connections, credentials.
- Windows Event Log AnalysisAI CISO
Triage Security / System / Sysmon channels for logon anomalies, service abuse, and persistence traces.
Supply Chain · 4
- CI/CD Pipeline HardeningAI CISO, AI CTO
Harden CI/CD: OIDC federation, pinned action SHAs, least-privilege runners, SBOM + signing on release.
- Container Image ScanningAI CISO, AI CTO
Trivy / Grype / Snyk scanning and base-image hygiene; CVE triage workflow gated at build and admission.
- SBOM Generation & AnalysisAI CISO
CycloneDX / SPDX SBOM generation, consumption, and exploitability triage aligned with NTIA minimum elements.
- Secrets Scanning in Git HistoryAI CISO
TruffleHog / Gitleaks / detect-secrets pipeline across branches and history with revocation and rotation playbook.
Threat Hunting · 5
- APT Campaign AnalysisAI CISO
Map observed TTPs to MITRE ATT&CK, pivot over known APT playbooks, produce adversary emulation plan.
- C2 Beaconing DetectionAI CISO
Statistical and JA3 / JARM based detection of command-and-control beacons over HTTPS and DNS.
- DNS Tunneling DetectionAI CISO
Detect DNS exfiltration and covert channels via entropy, subdomain length, NXDOMAIN ratios, and query rate.
- Lateral Movement HuntingAI CISO
Hunt RDP / SMB / WMI / WinRM based lateral movement across endpoint + identity telemetry.
- Persistence Mechanism ReviewAI CISO
Enumerate persistence: run keys, scheduled tasks, services, WMI subscriptions, startup items across OS platforms.
LexCux Legal Pack
Legal and compliance skills covering EU, Turkish, US, and cross-border contract and regulatory review.
12 skills · 4 categories
EU · 3
- EU AI Act ReadinessAI CLO
Risk-tier classification under the EU AI Act (Regulation 2024/1689) and obligations checklist for providers / deployers.
- EU Digital Services Act ComplianceAI CLO
DSA obligations mapping (Articles 14, 15, 16, 25, 40) for intermediary and hosting services.
- EU GDPR Data MapAI CLO
Produce the Article 30 records of processing (ROPA) and associated lawful-basis + transfer impact map.
Global · 2
Turkey · 4
- TR Contract AnalyzerAI CLO
Turkish-language contract review with Borçlar Kanunu clause extraction, risk scoring, and negotiation markup.
- TR İş Kanunu Employment RiskAI CLO, AI CHRO
Employment contract and workflow review against Turkish Labor Law (İş Kanunu) — overtime, termination, severance, notice.
- TR KVKK Compliance AuditAI CLO, AI CISO
KVKK (Law 6698) full compliance audit covering data processing, cross-border transfer, and breach workflow.
- TR TTK Commercial CheckAI CLO
Turkish Commercial Code (TTK) compliance check for commercial documents, trade registry filings, corporate governance.
US · 3
- US CCPA / CPRA CheckAI CLO
California Consumer Privacy Act + CPRA compliance check: consumer rights, opt-out signals, vendor contracts.
- US HIPAA PHI AuditAI CLO, AI CISO
HIPAA Privacy + Security Rule audit for covered entities and business associates; PHI flow mapping.
- US SOC 2 Gap AnalysisAI CLO, AI CISO
SOC 2 Trust Service Criteria readiness gap analysis with control-by-control evidence matrix.
CGO Growth Kit
Traction channel playbooks for growth — content, SEM/SEO, community, sales, events, PR, and more.
19 skills · 1 categories
Channel · 19
- Affiliate ProgramsAI CGO, AI CMO
Design affiliate program economics, onboarding, and tracking infrastructure for partner-driven acquisition.
- Business DevelopmentAI CGO, AI CSO
Structured BD playbook — partner target list, outreach cadence, co-marketing, and revenue share frames.
- Community BuildingAI CGO, AI CMO
Community strategy — platform choice, programming calendar, member onboarding, moderation, engagement metrics.
- Content MarketingAI CGO, AI CMO
Editorial planning, topic taxonomy, distribution, repurposing, and performance measurement for content-driven growth.
- Email MarketingAI CGO, AI CMO
Lifecycle email + newsletter strategy: list hygiene, segmentation, deliverability, A/B testing, revenue attribution.
- Engineering as MarketingAI CGO, AI CTO
Build free tools, APIs, or widgets as distribution mechanisms for acquisition and brand equity.
- Existing PlatformsAI CGO, AI CMO
Leverage existing large-audience platforms (app stores, marketplaces, social) as a primary acquisition surface.
- Offline AdsAI CGO, AI CMO
OOH, radio, print, TV ad planning with measurable response mechanics and attribution where possible.
- Offline EventsAI CGO, AI CMO
Event strategy — dinners, meet-ups, conferences, field marketing — with funnel and ROI framework.
- PublicityAI CGO, AI CMO
Press and media relations: reporter targeting, pitch writing, embargoes, and newsjacking calendar.
- SalesAI CGO, AI CRO
Direct sales motion design — territories, quotas, enablement, pipeline review, and win-loss analysis.
- Search Engine MarketingAI CGO, AI CMO
Paid search (Google Ads, Bing Ads) structure, keyword discovery, bidding strategy, and landing page optimization.
- Search Engine OptimizationAI CGO, AI CMO
Technical SEO, on-page, link building, Core Web Vitals, and programmatic SEO patterns.
- Social & Display AdsAI CGO, AI CMO
Paid social (Meta, LinkedIn, TikTok, X) and display campaign frameworks with creative testing cadence.
- Speaking EngagementsAI CGO, AI CMO
Keynote and talk circuit strategy: target conferences, pitch templates, and lead capture post-talk.
- Targeting BlogsAI CGO, AI CMO
Guest post and niche blog outreach playbook — target list, pitch sequences, and performance tracking.
- Trade ShowsAI CGO, AI CMO
Trade show planning and booth ROI: pre-show marketing, scanning, follow-up sequences, attribution.
- Unconventional PRAI CGO, AI CMO
Stunts, guerrilla campaigns, and asymmetric PR plays that punch above their budget weight.
- Viral MarketingAI CGO, AI CMO
K-factor mechanics, referral loops, invite-based onboarding, and viral coefficient measurement.