incident-report
SKILL.md
Incident Report Skill
Generate comprehensive incident reports and post-mortems following team standards. Supports two report types: internal technical analysis and client-facing communications.
Quick Start
- Classify the incident (severity, type, audience)
- Gather information using the discovery prompts
- Generate the appropriate report using templates
- Review using the checklist
Phase 1: Classification
Severity Levels
| Level | Criteria | Response Time |
|---|---|---|
| P0 Critical | Data breach, cross-tenant exposure, complete outage | Immediate |
| P1 High | Partial outage, significant performance degradation, security vulnerability | < 1 hour |
| P2 Medium | Degraded service, non-critical feature down | < 4 hours |
| P3 Low | Minor issue, cosmetic, workaround available | Next business day |
Incident Types
- Outage: Service unavailable or severely degraded
- Security: Vulnerability, unauthorized access, data exposure
- Data Leak: Customer data exposed to wrong party
- Performance: Latency spikes, memory issues, 5xx errors
- Configuration: Misconfig causing issues, deployment failures
Report Audience
| Audience | Report Type | Focus |
|---|---|---|
| Internal | Technical post-mortem | Root cause, technical details, action items |
| Client | Customer communication | Impact, resolution, prevention, reassurance |
Phase 2: Information Gathering
Before writing, gather these details. Ask the user if any are missing:
Core Facts (Required)
- Incident date and time (with timezone)
- Duration of impact
- Affected systems/services
- Affected customers/sites
- Who detected it (monitoring, customer report, internal)
- Current status (ongoing, resolved, monitoring)
Technical Details (Internal Reports)
- What was the root cause?
- What was the timeline? (detection → investigation → fix → verification)
- What commands/logs showed the issue?
- What was the fix applied?
- Were there any secondary effects?
Impact Assessment
- Number of affected requests/users
- Error rates (percentage)
- Revenue impact (if applicable)
- Data exposure scope (if security/data leak)
- Customer complaints received
Resolution Details
- What immediate fix was applied?
- Who was involved in resolution?
- How was the fix verified?
- Are there follow-up actions needed?
Phase 3: Generate Report
Internal Technical Report
Use template: templates/internal-report.md
Structure:
- TL;DR - 3-5 bullet summary for busy readers
- Executive Summary - One paragraph overview
- Timeline - Chronological events
- Root Cause Analysis - Technical deep-dive
- Impact - Quantified effects
- Resolution - What was done
- Action Items - TODO list with owners
- Lessons Learned - Blameless retrospective
- References - Links, logs, PRs
Client-Facing Report
Use template: templates/client-report.md
Structure:
- Subject Line - Clear, professional
- Acknowledgment - We take this seriously
- What Happened - Non-technical explanation
- Impact on You - Specific to this client
- Resolution - What we did
- Prevention - What we're doing to prevent recurrence
- Contact - Who to reach for questions
Phase 4: Review Checklist
Before finalizing, verify:
Content Quality
- Timeline is accurate and complete
- Root cause is clearly identified (not symptoms)
- Impact is quantified with real numbers
- Action items have owners and priorities
- No blame assigned to individuals
Client Reports Additional
- Technical jargon removed or explained
- Tone is professional and empathetic
- Next steps are clear
- Contact information included
- Client-specific impact addressed
Security Incidents Additional
- Scope of exposure documented
- Affected data types listed
- Customer notification requirements checked
- Compliance implications noted (LGPD, GDPR)
Blameless Post-Mortem Principles
- Focus on systems, not people - "The monitoring gap allowed..." not "John failed to..."
- Assume good intent - Everyone was trying to do the right thing
- Learn, don't punish - Goal is improvement, not blame
- Be specific - "Deploy at 14:32 caused..." not "Recent changes caused..."
- Quantify impact - "2% of 30k requests = 600 errors" not "some errors"
Writing Tips
For Internal Reports
- Be technically precise
- Include actual commands, logs, configs
- Link to related PRs, issues, dashboards
- Use diagrams for complex flows
For Client Reports
- Lead with resolution/status
- Avoid defensive language
- Be specific about prevention measures
- Keep under 500 words unless complex
- Translate technical terms
File Naming Convention
{slug}-{YYYY-MM-DD}.md
Examples:
- istio-xds-message-overflow-2026-02-03.md
- openbox2-traffic-spike-502-2026-02-05.md
- aviator-cross-tenant-routing-2026-02-03.md
Additional Resources
- templates/internal-report.md - Full internal template
- templates/client-report.md - Client communication template
- references/5-whys.md - Root cause analysis technique
Weekly Installs
2
Repository
decocms/deco-startFirst Seen
8 days ago
Security Audits
Installed on
amp2
cline2
opencode2
cursor2
kimi-cli2
codex2