{"skill":{"slug":"network-log-analysis","displayName":"Network Log Analysis","summary":"Device-level network log analysis using raw syslog data without SIEM platforms. Guides forensic timeline construction from rsyslog/syslog-ng collectors, devi...","tags":{"latest":"1.0.0"},"stats":{"comments":0,"downloads":102,"installsAllTime":1,"installsCurrent":1,"stars":0,"versions":1},"createdAt":1775012585317,"updatedAt":1775013711500},"latestVersion":{"version":"1.0.0","createdAt":1775012585317,"changelog":"- Initial release: Skill for device-level network log analysis using raw syslog data, without reliance on SIEM platforms.\n- Provides step-by-step guidance for forensic timeline construction using rsyslog/syslog-ng collectors, device console logs, and SNMP trap data.\n- Covers syslog pattern recognition for Cisco IOS-XE, Juniper JunOS, and Arista EOS log formats, including severity/facility mapping.\n- Explains multi-device event correlation and timeline reconstruction using standard Unix tools (grep, awk, sort, sed) and NTP-aware timestamp normalization.\n- Includes guidance on anomaly detection via baseline deviation and log retention policy verification.\n- Prerequisites, stepwise procedures, and references to CLI one-liners and syslog pattern catalogs are documented.","license":"MIT-0"},"metadata":null,"owner":{"handle":"vahagn-madatyan","userId":"s172e0s6wm08gdxkw6pxzkwzgh841b69","displayName":"Vahagn Madatyan","image":"https://avatars.githubusercontent.com/u/74753362?v=4"},"moderation":{"isSuspicious":true,"isMalwareBlocked":false,"verdict":"suspicious","reasonCodes":["suspicious.vt_suspicious"],"summary":"Detected: suspicious.vt_suspicious","engineVersion":"v2.2.0","updatedAt":1775013711500}}