Use this skill when working in the DFIRWS Windows Sandbox to analyze artifacts with built-in tools, especially when the task mentions C:\Tools, C:\venv, C:\git, Desktop\readwrite, Desktop\readonly, or DFIR triage workflows. It provides deterministic workflows for selecting tools, running quick triage, and reporting repeatable commands.
Use this skill when the user asks to:
Before answering, read the relevant reference files:
references/dfirws-paths-and-tools.mdreferences/mcp-servers.mdreferences/common-workflows.mdreferences/enrichment-data.mdreferences/python-tools.mdConfirm scope
Desktop\readonly for input artifacts, Desktop\readwrite for analysis output).Check for MCP server availability
Pick the least-friction toolchain
C:\Tools (native binaries, fastest).C:\venv (see references/python-tools.md).C:\git.C:\enrichment (see references/enrichment-data.md).Run a quick triage pass before deep analysis
Desktop\readwrite.Escalate only when needed
Cross-reference with enrichment data when appropriate
Return reproducible output
Use this structure in responses:
C:\Tools\hayabusa\hayabusa.exe, not just hayabusa).Desktop\readonly as evidence input and keep all derived files in Desktop\readwrite.evtx_security_hayabusa_results.csv).