Incident Response
Run an incident response workflow — triage, communicate, and write postmortem. Trigger with "we have an incident", "production is down", an alert that needs severity assessment, a status update mid-incident, or when writing a blameless postmortem after resolution.
$ npx promptcreek add incident-responseAuto-detects your installed agents and installs the skill to each one.
What This Skill Does
This skill helps manage incidents from detection to postmortem, guiding users through triage, communication, mitigation, and postmortem phases. It assists in assessing severity, assigning roles, drafting communications, and documenting mitigation steps. It's useful for on-call engineers and incident commanders to effectively handle and resolve incidents.
When to Use
- Start a new incident with a description.
- Post a status update during an incident.
- Generate a postmortem document after resolution.
- Assess the severity of an incident.
- Assign roles to incident responders.
- Document mitigation steps taken during an incident.
Key Features
Installation
$ npx promptcreek add incident-responseAuto-detects your installed agents (Claude Code, Cursor, Codex, etc.) and installs the skill to each one.
View Full Skill Content
/incident-response
> If you see unfamiliar placeholders or need to check which tools are connected, see CONNECTORS.md.
Manage an incident from detection through postmortem.
Usage
/incident-response $ARGUMENTS
Modes
/incident-response new [description] # Start a new incident
/incident-response update [status] # Post a status update
/incident-response postmortem # Generate postmortem from incident data
If no mode is specified, ask what phase the incident is in.
How It Works
┌─────────────────────────────────────────────────────────────────┐
│ INCIDENT RESPONSE │
├─────────────────────────────────────────────────────────────────┤
│ Phase 1: TRIAGE │
│ ✓ Assess severity (SEV1-4) │
│ ✓ Identify affected systems and users │
│ ✓ Assign roles (IC, comms, responders) │
│ │
│ Phase 2: COMMUNICATE │
│ ✓ Draft internal status update │
│ ✓ Draft customer communication (if needed) │
│ ✓ Set up war room and cadence │
│ │
│ Phase 3: MITIGATE │
│ ✓ Document mitigation steps taken │
│ ✓ Track timeline of events │
│ ✓ Confirm resolution │
│ │
│ Phase 4: POSTMORTEM │
│ ✓ Blameless postmortem document │
│ ✓ Timeline reconstruction │
│ ✓ Root cause analysis (5 whys) │
│ ✓ Action items with owners │
└─────────────────────────────────────────────────────────────────┘
Severity Classification
| Level | Criteria | Response Time |
|-------|----------|---------------|
| SEV1 | Service down, all users affected | Immediate, all-hands |
| SEV2 | Major feature degraded, many users affected | Within 15 min |
| SEV3 | Minor feature issue, some users affected | Within 1 hour |
| SEV4 | Cosmetic or low-impact issue | Next business day |
Communication Guidance
Provide clear, factual updates at regular cadence. Include: what's happening, who's affected, what we're doing, when the next update is.
Output — Status Update
## Incident Update: [Title]
Severity: SEV[1-4] | Status: Investigating | Identified | Monitoring | Resolved
Impact: [Who/what is affected]
Last Updated: [Timestamp]
Current Status
[What we know now]
Actions Taken
- [Action 1]
- [Action 2]
Next Steps
- [What's happening next and ETA]
Timeline
| Time | Event |
|------|-------|
| [HH:MM] | [Event] |
Output — Postmortem
## Postmortem: [Incident Title]
Date: [Date] | Duration: [X hours] | Severity: SEV[X]
Authors: [Names] | Status: Draft
Summary
[2-3 sentence plain-language summary]
Impact
- [Users affected]
- [Duration of impact]
- [Business impact if quantifiable]
Timeline
| Time (UTC) | Event |
|------------|-------|
| [HH:MM] | [Event] |
Root Cause
[Detailed explanation of what caused the incident]
5 Whys
- Why did [symptom]? → [Because...]
- Why did [cause 1]? → [Because...]
- Why did [cause 2]? → [Because...]
- Why did [cause 3]? → [Because...]
- Why did [cause 4]? → [Root cause]
What Went Well
- [Things that worked]
What Went Poorly
- [Things that didn't work]
Action Items
| Action | Owner | Priority | Due Date |
|--------|-------|----------|----------|
| [Action] | [Person] | P0/P1/P2 | [Date] |
Lessons Learned
[Key takeaways for the team]
If Connectors Available
If ~~monitoring is connected:
- Pull alert details and metrics
- Show graphs of affected metrics
If ~~incident management is connected:
- Create or update incident in PagerDuty/Opsgenie
- Page on-call responders
If ~~chat is connected:
- Post status updates to incident channel
- Create war room channel
Tips
- Start writing immediately — Don't wait for complete information. Update as you learn more.
- Keep updates factual — What we know, what we've done, what's next. No speculation.
- Postmortems are blameless — Focus on systems and processes, not individuals.
Supported Agents
Attribution
Details
- License
- MIT
- Source
- admin
- Published
- 3/18/2026
Tags
Related Skills
Agent Protocol
Inter-agent communication protocol for C-suite agent teams. Defines invocation syntax, loop prevention, isolation rules, and response formats. Use when C-suite agents need to query each other, coordinate cross-functional analysis, or run board meetings with multiple agent roles.
CTO Advisor
Technical leadership guidance for engineering teams, architecture decisions, and technology strategy. Use when assessing technical debt, scaling engineering teams, evaluating technologies, making architecture decisions, establishing engineering metrics, or when user mentions CTO, tech debt, technical debt, team scaling, architecture decisions, technology evaluation, engineering metrics, DORA metrics, or technology strategy.
Agent Workflow Designer
Agent Workflow Designer