Overview
The/oss-forensics command provides evidence-backed forensic investigation for public GitHub repositories. It uses GitHub Archive (BigQuery), GitHub API, Wayback Machine recovery, and local git analysis to investigate security incidents, supply chain attacks, and suspicious activities.
Syntax
Parameters
Natural language description of what to investigate
Maximum evidence collection rounds for followup investigations
Maximum hypothesis revision rounds if validation fails
What It Does
- Parses investigation prompt and forms research question
- Spawns parallel evidence collectors (5 specialist agents)
- Queries immutable archives (GitHub Archive via BigQuery)
- Recovers deleted content (Wayback Machine, dangling commits)
- Forms evidence-backed hypotheses with followup requests
- Verifies all evidence against original sources
- Validates claims against verified evidence
- Generates forensic report with timeline, attribution, IOCs
Investigation Workflow
The forensics workflow executes these phases automatically:Phase 0: Initialize
Runs initialization script to set up investigation workspace.Phase 1: Parse Prompt
Converts natural language prompt to structured research question.Phase 2: Evidence Collection (Parallel)
Spawns 4-5 investigators in parallel:- oss-investigator-gh-archive-agent: Queries GitHub Archive (BigQuery) for immutable event history
- oss-investigator-github-agent: Queries GitHub API and recovers commits by SHA
- oss-investigator-wayback-agent: Recovers deleted content from Wayback Machine
- oss-investigator-local-git-agent: Analyzes cloned repos for dangling commits
- oss-investigator-ioc-extractor-agent: Extracts IOCs from vendor reports (if URL provided)
Phase 3: Hypothesis Formation Loop
oss-hypothesis-former-agent analyzes evidence and:- Forms evidence-backed hypothesis
- Identifies loose ends
- Requests followup evidence collection
- Iterates until
--max-followupsreached
Phase 4: Evidence Verification
oss-evidence-verifier-agent verifies all evidence:- Re-queries original sources
- Marks evidence as verified/failed
- Updates EvidenceStore
Phase 5: Hypothesis Validation Loop
oss-hypothesis-checker-agent validates claims:- Checks each claim against verified evidence
- Rejects unsupported claims
- Requests revision if needed
- Iterates until
--max-retriesreached
Phase 6: Generate Report
oss-report-generator-agent produces final forensic report:- Timeline of events
- Attribution analysis
- Indicators of Compromise (IOCs)
- Evidence references
Phase 7: Completion
Informs user of output location.Examples
Investigate User Activity
Validate Vendor Report
Investigate Specific Incident
Extended Investigation
Prerequisites
Google Cloud Credentials
Path to Google Cloud service account JSON for BigQuery accessSee
.claude/skills/oss-forensics/github-archive/SKILL.md for setup instructions.Internet Access
Required for:- GitHub API queries
- Wayback Machine recovery
- BigQuery queries
Evidence Sources
GitHub Archive (Immutable)
Queries GH Archive via BigQuery:- All public GitHub events since 2011
- Immutable historical record
- Push events, PR events, issue events, release events
- User activity patterns
GitHub API (Live)
Queries current state:- Repositories
- Commits (including by SHA if deleted from branches)
- Issues and pull requests
- Releases and tags
- User profiles
Wayback Machine (Recovery)
Recovers deleted content:- Deleted repository files
- Removed documentation
- Historical README versions
- Deleted issues/PRs (if archived)
Local Git Analysis (Forensics)
Analyzes cloned repositories:- Dangling commits (deleted but not garbage collected)
- Reflog analysis
- Hidden branches
- Force-push history
Vendor Reports (IOCs)
Extracts indicators from security reports:- SHA-256 hashes
- Repository URLs
- User accounts
- Timestamps
- Attack techniques
Output Structure
Forensic Report Format
Use Cases
- Supply chain attack investigation: Trace malicious commits
- Incident response: Understand what happened and when
- Threat intelligence: Extract IOCs and TTPs
- Vendor report validation: Verify claims with evidence
- Attribution analysis: Identify threat actors
- Timeline reconstruction: Build event sequences
Evidence Verification
All evidence is verified against original sources before being used in hypotheses.
- Collection: Agents collect evidence with source references
- Storage: Evidence stored in EvidenceStore with metadata
- Verification: Re-query original source to confirm
- Status: Mark as verified/failed
- Usage: Only verified evidence used in final report
Skills Referenced
The forensics workflow uses skills from.claude/skills/oss-forensics/:
- github-archive: GH Archive BigQuery queries
- github-evidence-kit: Evidence collection, storage, verification
- github-commit-recovery: Recover deleted commits
- github-wayback-recovery: Recover content from Wayback Machine
Related Commands
/crash-analysis
Root-cause analysis for crashes
/validate
Vulnerability validation pipeline
/scan
Source code security scanning
Notes
- Requires
GOOGLE_APPLICATION_CREDENTIALSfor BigQuery - Internet access required for GitHub API and Wayback Machine
- Evidence is verified before use in reports
- Produces audit trail of investigation process
- All evidence includes source references
- For security research and incident response