Skip to content

Commit 1a52bf4

Browse files
authored
add AI Assistant in Asset Inventory prompts (elastic#15393)
* add AI Assistant in Asset Inventory prompts * add PR link to changelog
1 parent 1ded072 commit 1a52bf4

File tree

73 files changed

+87
-71
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

73 files changed

+87
-71
lines changed

packages/security_ai_prompts/changelog.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,9 @@
11
# newer versions go on top
2+
- version: "1.0.4"
3+
changes:
4+
- description: "Add prompts for AI Assistant in Asset Inventory "
5+
type: enhancement
6+
link: https://github.com/elastic/integrations/pull/15393
27
- version: "1.0.3"
38
changes:
49
- description: "Fix knowledge history and add some defend insights and entity analytics prompts."
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,6 @@
66
"default": "Return **only a single-line stringified JSON object** without any code fences, explanations, or variable assignments. Do **not** wrap the output in triple backticks or any Markdown code block. \n\nThe result must be a valid stringified JSON object that can be directly parsed with `JSON.parse()` in JavaScript.\n\n**Strict rules**:\n- The output must **not** include any code blocks (no triple backticks).\n- The output must be **a string**, ready to be passed directly into `JSON.parse()`.\n- All backslashes (`\\`) must be escaped **twice** (`\\\\\\\\`) so that the string parses correctly in JavaScript.\n- The JSON must follow this structure:\n {{\n \"summary\": \"Markdown-formatted summary with inline code where relevant.\",\n \"recommendedActions\": \"Markdown-formatted action list starting with a `###` header.\"\n }}\n- The summary text should just be text. It does not need any titles or leading items in bold.\n- Markdown formatting should be used inside string values:\n - Use `inline code` (backticks) for technical values like file paths, process names, arguments, etc.\n - Use `**bold**` for emphasis.\n - Use `-` for bullet points.\n - The `recommendedActions` value must start with a `###` header describing the main action dynamically (but **not** include \"Recommended Actions\" as the title).\n- **Do not** include any extra explanation or text. Only return the stringified JSON object.\n\nThe response should look like this:\n{{\"summary\":\"Markdown-formatted summary text.\",\"recommendedActions\":\"Markdown-formatted action list starting with a ### header.\"}}"
77
}
88
},
9-
"id": "security_ai_prompts-ec2463b8-7a98-4ca3-afce-a2589b090af1",
9+
"id": "security_ai_prompts-033a717a-7614-4451-9734-acda24bef075",
1010
"type": "security-ai-prompt"
1111
}
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,6 @@
66
"default": "Suggest"
77
}
88
},
9-
"id": "security_ai_prompts-76dff525-4e29-4866-baa7-0480740e2eb1",
9+
"id": "security_ai_prompts-0601602b-5543-40c1-991e-1610a054ce62",
1010
"type": "security-ai-prompt"
1111
}
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,6 @@
66
"default": "You are given Elasticsearch Lens aggregation results showing cost savings over time:"
77
}
88
},
9-
"id": "security_ai_prompts-cecbf418-3e4f-4245-8dfa-f2d954071cc0",
9+
"id": "security_ai_prompts-08740aeb-c2a7-432e-962b-698bdb291768",
1010
"type": "security-ai-prompt"
1111
}
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,6 @@
66
"default": "bell"
77
}
88
},
9-
"id": "security_ai_prompts-5676d325-0c3c-48ba-92f0-e8d685ed7a65",
9+
"id": "security_ai_prompts-0a021f67-deef-4bd9-a3e1-0bf8254d8fef",
1010
"type": "security-ai-prompt"
1111
}
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,6 @@
66
"default": "sparkles"
77
}
88
},
9-
"id": "security_ai_prompts-307e65d6-21b3-4a2c-a71b-31a61604c6c1",
9+
"id": "security_ai_prompts-0a1c27c1-2a13-4a93-96e6-abfae131f241",
1010
"type": "security-ai-prompt"
1111
}
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,6 @@
66
"default": "Evaluate the cyber security alert from the context above. Your response should take all the important elements of the alert into consideration to give me a concise summary of what happened. This is being used in an alert details flyout in a SIEM, so keep it detailed, but brief. Limit your response to 500 characters. Anyone reading this summary should immediately understand what happened in the alert in question. Only reply with the summary, and nothing else.\n\nUsing another 200 characters, add a second paragraph with a bulleted list of recommended actions a cyber security analyst should take here. Don't invent random, potentially harmful recommended actions."
77
}
88
},
9-
"id": "security_ai_prompts-c26fe3a1-5819-4f3f-a575-863a25cbaed2",
9+
"id": "security_ai_prompts-0e51bdfb-d197-4756-be7d-69f566e13c75",
1010
"type": "security-ai-prompt"
1111
}
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,6 @@
66
"default": "Alerts"
77
}
88
},
9-
"id": "security_ai_prompts-5b60c193-6d29-43ba-beab-a87f4ad7be2e",
9+
"id": "security_ai_prompts-0f67baa1-fe54-4c52-8417-904f007a0662",
1010
"type": "security-ai-prompt"
1111
}
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,6 @@
66
"default": "Please provide a comprehensive analysis of each selected Elastic Security detection rule, and consider using applicable tools for each part of the below request. Make sure you consider using appropriate tools available to you to fulfill this request. For each rule, include:\n- The rule name and a brief summary of its purpose.\n- The full detection query as published in Elastic’s official detection rules repository.\n- An in-depth explanation of how the query works, including key fields, logic, and detection techniques.\n- The relevance of the rule to modern threats or attack techniques (e.g., MITRE ATT&CK mapping).\n- Typical implications and recommended response actions for an organization if this rule triggers.\n- Any notable false positive considerations or tuning recommendations.\nFormat your response using markdown with clear headers for each rule, code blocks for queries, and concise bullet points for explanations."
77
}
88
},
9-
"id": "security_ai_prompts-ab6390b7-659d-41b9-9ce4-60e6dde8d57f",
9+
"id": "security_ai_prompts-1769c191-c8cd-4d8a-bdbd-44159d815ac6",
1010
"type": "security-ai-prompt"
1111
}
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,6 @@
66
"default": "A short (no more than a sentence) summary of the insight featuring only the host.name and user.name fields (when they are applicable), using the same {{ field.name fieldValue1 fieldValue2 fieldValueN }} syntax"
77
}
88
},
9-
"id": "security_ai_prompts-1e154a52-f2cd-4d40-b76c-7154993ef0ee",
9+
"id": "security_ai_prompts-177b6775-7bf8-4d97-8268-6d2e0c2928a9",
1010
"type": "security-ai-prompt"
1111
}

0 commit comments

Comments
 (0)