▮▮▮Spotter MCP · Worked sample▮▮▮
All three phases on one synthetic epic.
One epic — Adversary-Informed Vulnerability Prioritization — taken through each of the Spotter's three phases. Real output from the v0.2.0 skill, not a mockup.
Phase 01
Starting from blank
You have an initiative and a blank page. The Spotter walks you through the questions a strong epic answers, one at a time, and turns your answers into a working draft.
Conversation
Working draft · Adversary-Informed Vulnerability Prioritization v0.1
The user and the problem
VM engineers at security-mature enterprises. They patch the wrong things because CVSS-sorted backlogs miss what matters. Half their time is hand-recalibrating against threat intel and asset data. The work queue, not the score, is the goal.
Competitive landscape
Tenable VPR, Qualys TruRisk, Rapid7 Active Risk. All three score well in RFPs but underperform in adoption because scores live in a column users have to choose to sort by.
What we're betting on
The four-way join — first-party telemetry, threat intel, EDR-discovered inventory, agent-side configuration. Competitors have one or two; we have all four. 18–24 month window before parity.
How we'll build it
AI accelerated. LLM reasoning powers the explainability layer and the daily refresh logic. Static rules would force every customer to use the same weighting.
What else changes
Stub. Ticketing integration named; full cascade still to draft.
Packaging and pricing
Premium and Enterprise. Included in the existing VM module. No tier upsell. Pricing committee notified.
Launch readiness
GA tied to Q2 release. Documentation with migration guide. Field enablement. Launch blog and case study from a design partner.
After it ships
Adoption, patch SLA improvement, NPS. Quarterly review.
Trust and governance
Stub. Manual overrides with audit trail named; granular trust model and RBAC still to draft.
Phase 02
Working a draft
You have a draft and one section is weaker than the rest. Tell the Spotter which one, and you'll get specific suggestions for how to strengthen it.
Conversation
Section · Trust and governance
Describe the trust gradient. Customers don't trust the prioritized queue all at once. They trust it signal by signal: observation → recommendation → approve-to-execute → auto-execute. Spell out the four levels and the rules for moving between them.
Name who can grant trust at each level. SOC manager? CISO? Tier 2 analyst? Map to real roles. RBAC isn't a launch-day afterthought for a feature that changes which patches get priority.
Commit to transparency in writing. The Approach section mentions the explainability layer. Lens 9 needs the commitment: AI-driven priority changes show their reasoning, the team has read it, and the action is logged.
Describe the audit trail surface. Every priority change — agent-driven or human-driven — produces an auditable record: who, what, when, why, evidence, outcome. Compliance teams will require this. The epic should name it.
Phase 03
Before stakeholders see it
The epic is complete. The Spotter walks all nine sections, calls a verdict on each, and gives you a headline plus suggestions where strengthening is worth your time.
Conversation
Epic · Adversary-Informed Vulnerability Prioritization
Pass
1
Needs work
6
Missing
2
Where to push next
"Manual overrides with an audit trail is the floor, not the trust story."
You could strengthen this by
"Ticketing is mentioned in passing. The rest of the cascade isn't named."
You could strengthen this by
"AI accelerated is clear. Skills-first and UI restraint are missing."
You could strengthen this by
"Marquee bullets hit. Rollback, sequencing, and PLG are missing."
You could strengthen this by
A spotter lifts the lifter. Not the bar.