Skip to main content
Version: main

Vulnerability Policy Generator

The Vulnerability Policy Generator is an AI Skill that automates the analysis of security vulnerabilities and generates vArmor mitigation rules. Given a CVE ID, PoC repository, or vulnerability write-up, it produces rules that you can integrate into your existing vArmor policies.

What It Does

The Skill guides an LLM through a structured analysis workflow:

  1. Information gathering — Fetches CVE details, PoC code, and related write-ups
  2. Root cause analysis — Identifies the vulnerable code path, required syscalls, kernel modules, and privileges
  3. Exploitability assessment — Rates each variant's real-world threat level in container environments
  4. Defense point analysis — Maps every exploit step to potential vArmor blocking points, evaluating precision vs. business impact
  5. Rule generation — Produces mitigation rules with correct syntax (referencing vArmor API type definitions)
  6. Deployment guidance — Provides observe-then-enforce phased rollout instructions

Supported Vulnerability Types

TypeExamplesvArmor Defense Dimension
Kernel LPE / Container EscapeDirty Pipe, Copy Fail, Dirty FragSyscall restriction, socket protocol blocking, namespace restriction
Application RCE / Cluster TakeoverIngressNightmare (CVE-2025-1974)Network access control (restrict access to sensitive Services/ports)
Container Runtime EscapeCVE-2019-5736 (runc)File write restriction
Arbitrary File Read/WriteVarious web application vulnsFile access control
Credential TheftServiceAccount token abuseFile read restriction, network egress restriction
Supply ChainLog4Shell, etc.Network egress restriction, process execution restriction

Usage

Step 1: Get the Skill

Download the SKILL.md file from the vArmor repository:

Step 2: Load into an AI Assistant

Load the SKILL.md file as system context in any AI assistant that supports custom prompts or skills (Claude, GPT, Gemini, etc.).

Step 3: Provide Vulnerability Information

Give the AI assistant vulnerability details and ask it to generate vArmor mitigation rules:

User: New vuln just dropped - Dirty Frag (https://github.com/V4bel/dirtyfrag).
Can vArmor mitigate it? Generate protection rules.

Step 4: Review and Integrate

The Skill produces a vulnerability analysis report and mitigation rules. Review the output — especially the business impact assessment — then integrate the rules into your existing VarmorPolicy or VarmorClusterPolicy.

Factors Affecting Output Quality

  • LLM capability — This is a demanding task requiring multi-step technical reasoning and valid YAML generation. SOTA models produce significantly better results than smaller models.
  • Information retrieval — Better results when the LLM can access PoC source code, detailed write-ups, and vArmor API definitions.
  • Skill prompt quality — The structured methodology and reference cases guide the LLM's reasoning chain.
  • Human review — The Skill generates drafts, not final policies. Always validate before deploying to production.

Example Output

See the blog post for a complete walkthrough using the Dirty Frag vulnerability, including the generated rules and phased deployment instructions.

Relationship with Policy Advisor

Policy AdvisorVulnerability Policy Generator
FormPython CLI toolAI Skill (prompt file)
InputApplication features, capabilities, behavior dataVulnerability information (CVE, PoC)
OutputGeneral hardening policy templateMitigation rules for a specific vulnerability
Question answered"What protections should I apply to this workload?""How do I defend against this new CVE?"

Both tools are complementary. Policy Advisor generates baseline hardening policies; Vulnerability Policy Generator adds targeted mitigation rules when new threats emerge.