返回顶部
u

uplo-enterprise-it

AI-powered enterprise IT intelligence spanning DevOps, cybersecurity, and engineering. Unified search across infrastructure, security, and architecture documentation.

作者: admin | 来源: ClawHub
源自
ClawHub
版本
V 1.0.0
安全检测
已通过
107
下载量
0
收藏
概述
安装方式
版本历史

uplo-enterprise-it

# UPLO Enterprise IT — Technology Operations & Security Intelligence Your organization's IT knowledge base is connected through UPLO, covering the full stack of enterprise technology: infrastructure runbooks, incident postmortems, security advisories, architecture decision records, and CI/CD pipeline configurations. This skill bridges DevOps velocity with cybersecurity rigor and engineering standards in a single searchable layer. ## Session Start Pull your identity context to understand which systems, teams, and clearance tiers you operate within. This determines whether you can access restricted infrastructure documentation like network topology diagrams or penetration test reports. ``` get_identity_context ``` Then load current strategic directives — these often include active incident priorities, architecture migration mandates, or security hardening timelines that should inform your responses. ``` get_directives ``` ## When to Use - An engineer asks about the rollback procedure for the payments microservice after a failed canary deployment - Someone needs the current firewall rule matrix between the DMZ and internal VPC subnets - A security analyst wants to know which CVEs were flagged in the last quarterly vulnerability scan and their remediation status - A developer asks which authentication provider the organization standardized on and why (ADR context) - An SRE needs the escalation chain and communication protocol for a P1 outage on the data platform - A team lead wants to compare observability stack options that were evaluated during the last architecture review - Someone needs to verify whether the new container image registry meets SOC 2 control requirements ## Example Workflows ### Incident Response Triage A P2 alert fires for elevated error rates on the checkout service. The on-call engineer needs context fast. ``` search_knowledge query="checkout service error handling and circuit breaker configuration" ``` ``` search_with_context query="past incidents involving checkout service degradation and their root causes" ``` ``` search_knowledge query="checkout service runbook escalation contacts and rollback steps" ``` ### Security Compliance Audit Preparation The security team is preparing evidence for an upcoming SOC 2 Type II audit and needs to gather control documentation. ``` search_with_context query="access control policies for production database environments" ``` ``` search_knowledge query="encryption at rest and in transit standards for PII data stores" ``` ``` export_org_context ``` Review the exported context to identify gaps in documented controls before the auditor arrives. ## Key Tools for Enterprise IT **search_knowledge** — Fast vector search across your technical documentation. Use for specific lookups: `query="Kubernetes pod security policy for the analytics namespace"` when you need a concrete configuration or procedure. **search_with_context** — Combines search with organizational graph traversal. Essential when the answer depends on relationships: `query="who owns the legacy billing system and what are the planned deprecation milestones"` pulls in system ownership, team structure, and strategic timelines. **get_directives** — Returns active leadership priorities. Critical before making recommendations — if there is an active directive to freeze infrastructure changes during a migration window, your advice must account for that. **export_org_context** — Full organizational snapshot. Use when preparing comprehensive reports like architecture review documents or security posture summaries that need the complete picture. **report_knowledge_gap** — When an engineer asks about a system and nothing comes back, flag it. IT documentation debt compounds; this helps the org track what is missing: `topic="disaster recovery procedure for the Redis cluster" description="No DR runbook found for the shared Redis cluster serving 4 production services"` **flag_outdated** — Infrastructure documentation goes stale fast. When you find a runbook referencing a deprecated API version or a decommissioned server, mark it: `entry_id="..." reason="References us-east-1 deployment which was migrated to us-west-2 in Q3"` ## Tips - Infrastructure queries often span multiple schema types — a single Kubernetes question might touch runbooks (it_devops), threat models (cybersecurity), and architecture decision records (engineering). Use `search_with_context` for these cross-domain questions. - When someone asks "how do we do X", check directives first. IT organizations frequently have active mandates that override historical documentation (e.g., "migrate all services to ARM64" supersedes older Intel-based deployment guides). - Incident postmortems are high-signal documents. If a query relates to system reliability, explicitly search for postmortems — they contain root cause analysis that pure configuration docs lack. - Respect classification tiers strictly in IT contexts. Network architecture diagrams, penetration test results, and API key rotation procedures are typically restricted. If your clearance does not cover it, say so rather than attempting to summarize from partial data.

标签

skill ai

通过对话安装

该技能支持在以下平台通过对话安装:

OpenClaw WorkBuddy QClaw Kimi Claude

方式一:安装 SkillHub 和技能

帮我安装 SkillHub 和 uplo-enterprise-it-1776122292 技能

方式二:设置 SkillHub 为优先技能安装源

设置 SkillHub 为我的优先技能安装源,然后帮我安装 uplo-enterprise-it-1776122292 技能

通过命令行安装

skillhub install uplo-enterprise-it-1776122292

下载 Zip 包

⬇ 下载 uplo-enterprise-it v1.0.0

文件大小: 6.15 KB | 发布时间: 2026-4-14 13:41

v1.0.0 最新 2026-4-14 13:41
- Initial release of uplo-enterprise-it skill.
- Provides AI-powered unified search across DevOps, cybersecurity, and engineering documentation.
- Supports context-aware queries for incident response, security compliance, architecture, and operational procedures.
- Integrates tools for knowledge search, context-aware recommendations, directive retrieval, organizational context export, and documentation quality tracking.
- Enforces access based on user identity, team, and clearance tier, respecting documentation classification and security boundaries.

Archiver·手机版·闲社网·闲社论坛·羊毛社区· 多链控股集团有限公司 · 苏ICP备2025199260号-1

Powered by Discuz! X5.0   © 2024-2025 闲社网·线报更新论坛·羊毛分享社区·http://xianshe.com

p2p_official_large
返回顶部