agent security skill risk: low
AIDE File Integrity Monitoring Implementation
The prompt outlines prerequisites, six sequential steps, and expected outputs for configuring AIDE on Linux, including generating aide.conf, initializing a baseline database, runni…
SKILL 4 files · 2 folders
SKILL.md
--- name: implementing-file-integrity-monitoring-with-aide description: "Configure AIDE (Advanced Intrusion Detection Environment) for file integrity monitoring including baseline creation," --- # Implementing File Integrity Monitoring with AIDE ## Overview AIDE (Advanced Intrusion Detection Environment) is a host-based intrusion detection system that monitors file and directory integrity using cryptographic checksums. This skill covers generating AIDE configuration files, initializing baseline databases, running integrity checks, parsing change reports, and setting up automated cron-based monitoring with alerting. ## When to Use - When deploying or configuring implementing file integrity monitoring with aide capabilities in your environment - When establishing security controls aligned to compliance requirements - When building or improving security architecture for this domain - When conducting security assessments that require this implementation ## Prerequisites - AIDE installed on target Linux system (apt install aide / yum install aide) - Root or sudo access for file system scanning - Python 3.8+ with standard library ## Steps 1. **Generate AIDE Configuration** — Create aide.conf with monitoring rules for critical directories (/etc, /bin, /sbin, /usr/bin, /boot) 2. **Initialize Baseline Database** — Run aide --init to create the initial file integrity baseline 3. **Run Integrity Check** — Execute aide --check to compare current state against baseline 4. **Parse Change Report** — Extract added, removed, and changed files from AIDE output 5. **Configure Automated Monitoring** — Generate cron job for scheduled integrity checks 6. **Generate Compliance Report** — Produce structured report of all file changes with severity classification ## Expected Output - AIDE configuration file (aide.conf) - Baseline database creation status - JSON report of file changes (added/removed/changed) with severity - Cron job configuration for automated monitoring
REQUIRED CONTEXT
- AIDE installed on target Linux system
- Root or sudo access for file system scanning
- Python 3.8+ with standard library
EXPECTED OUTPUT
- Format
- structured_report
- Schema
- markdown_sections · AIDE configuration file (aide.conf), Baseline database creation status, JSON report of file changes (added/removed/changed) with severity, Cron job configuration for automated monitoring
- Constraints
- produce aide.conf file
- report baseline database status
- output JSON report of file changes with severity
- include cron job configuration
CAVEATS
- Dependencies
- AIDE installed on target Linux system (apt install aide / yum install aide)
- Root or sudo access for file system scanning
- Python 3.8+ with standard library
- Missing context
- Exact commands or code snippets for each step
- Definition or criteria for severity classification
- Ambiguities
- Header description is truncated: "including baseline creation,"
QUALITY
- OVERALL
- 0.65
- CLARITY
- 0.75
- SPECIFICITY
- 0.55
- REUSABILITY
- 0.65
- COMPLETENESS
- 0.60
IMPROVEMENT SUGGESTIONS
- Complete the truncated sentence in the YAML header description.
- Expand each numbered step with concrete commands or examples.
USAGE
Copy the prompt above and paste it into your AI of choice — Claude, ChatGPT, Gemini, or anywhere else you're working. Replace any placeholder sections with your own context, then ask for the output.
MORE FOR AGENT
- MoltPass Client for AI Agent Identitiesagentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Threat Modeling Security Expertagentsecurity
- Security Bluebook Policy Builderagentsecurity
- Security Bluebook Policy Builderagentsecurity
- Security Blue Book Policy Builderagentsecurity
- Threat Modeling Security Architecture Expertagentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Threat Modeling Security Expertagentsecurity
- SIEM Detection Rule Tuning Guideagentsecurity
- AI File Metadata Compliance Auditoragentsecurity
- Azure Storage Misconfiguration Audit Reporteragentsecurity
- Implementing PAM for Database Accessagentsecurity
- AFL++ Coverage-Guided Fuzzing Procedureagentsecurity
- Supply Chain Attack Simulation Detectoragentsecurity
- Security Audit Fix Verifieragentsecurity
- Active Directory ACL Abuse Analyzeragentsecurity
- Privileged Access Workstation Implementation Guideagentsecurity
- SSRF Vulnerability Testing and Reporting Guideagentsecurity
- Security Audit Fix Revieweragentsecurity
- AWS IAM Privilege Escalation Detectoragentsecurity
- SSL/TLS Security Assessment with Sslyzeagentsecurity
- GCP Penetration Testing with GCPBucketBruteagentsecurity
- AWS CloudTrail Anomaly Detection Guideagentsecurity