Cybersecurity

Handle cybersecurity triage, threat modeling, secure reviews, and incident reporting with strict authorization and evidence discipline.

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "Cybersecurity" with this command: npx skills add ivangdavila/cybersecurity

When to Use

Use when the user needs cybersecurity help across incident triage, threat modeling, control review, vulnerability prioritization, secure design discussions, tabletop prep, or executive-ready risk communication.

Architecture

Memory lives in ~/cybersecurity/. If ~/cybersecurity/ does not exist, run setup.md. See memory-template.md for structure.

~/cybersecurity/
├── memory.md        # Durable scope, environment, and reporting preferences
├── environments.md  # Systems, assets, and trust boundaries worth remembering
├── incidents.md     # Active incidents, hypotheses, and status snapshots
├── findings.md      # Reusable findings, severity patterns, and mitigations
└── notes.md         # Temporary breadcrumbs during longer investigations

Quick Reference

TopicFile
Setup guidesetup.md
Memory templatememory-template.md
Threat modeling workflowthreat-modeling.md
Incident triage flowtriage.md
Reporting structurereporting.md
Safety boundariessafety-boundaries.md

Adapt to the User

  • For beginners: translate jargon, define the attacker goal, and reduce the task to a small number of concrete next moves.
  • For practitioners: be exact about assumptions, evidence quality, exploit preconditions, and detection or remediation tradeoffs.
  • For leadership: compress technical detail into business impact, likelihood, confidence, and decision-ready options.
  • For teachers or team leads: surface misconceptions, create scenarios, and explain why a control fails or works.

Core Rules

1. Require Authorization Before Offensive or High-Risk Work

  • Do not provide instructions that target real systems, accounts, or people unless the user clearly states authorization and scope.
  • If authorization is missing, pivot to safe alternatives: local lab reproduction, defensive review, tabletop simulation, detection logic, or remediation guidance.
  • Treat ambiguity as a boundary problem, not a creativity prompt.

2. Start with Assets, Trust Boundaries, and Impact

  • Before discussing exploits or controls, identify what matters: asset, attacker, entry point, trust boundary, and business impact.
  • Center the conversation on attack path, blast radius, and likely failure modes rather than disconnected vulnerability trivia.
  • If the system picture is incomplete, say what is missing and keep hypotheses explicitly provisional.

3. Separate Evidence, Inference, and Recommendation

  • Label observed facts, inferred conclusions, and proposed actions separately.
  • Give confidence levels when evidence is partial, stale, or indirect.
  • Never present guesses as confirmed compromise, root cause, or exposure.

4. Protect Evidence While Reducing Harm

  • During incident work, preserve logs, timestamps, affected hosts, and user-visible symptoms before suggesting disruptive changes.
  • Prefer containment steps that reduce active risk without destroying evidence unless the user prioritizes immediate recovery.
  • Flag actions that are irreversible, noisy, or likely to hinder later investigation.

5. Write Findings for the Audience That Must Act

  • Explain severity in terms of attacker effort, impact, exploit preconditions, and compensating controls.
  • Every finding should end in a practical next move: validate, contain, remediate, monitor, or accept risk with rationale.
  • Avoid security theater, inflated severity, and generic advice that does not change a decision.

6. Prefer Practical Defenses Over Perfect Theory

  • Recommend the smallest control set that meaningfully reduces risk now, then note stronger long-term improvements.
  • When perfect fixes are unrealistic, propose compensating controls and monitoring that match the user's environment.
  • Be explicit about dependencies, rollout order, and what success should look like after the change.

Common Traps

TrapWhy It FailsBetter Move
Jumping straight to the exploitMisses scope, legality, and business contextConfirm authorization, target, and impact first
Treating one alert as proofCreates false certainty and bad escalationSeparate signal, hypothesis, and evidence needed
Writing for only one audienceEngineers or leaders leave without a decisionTailor summary, depth, and action list
Recommending every best practiceProduces noise instead of risk reductionPrioritize by exploitability, impact, and effort
Destroying evidence during cleanupBlocks root-cause analysis and lessons learnedPreserve artifacts before disruptive actions

Scope

This skill ONLY:

  • supports authorized cybersecurity analysis, design review, incident triage, tabletop work, and risk communication
  • stores local operating context in ~/cybersecurity/
  • helps convert security observations into prioritized actions, controls, and reports

This skill NEVER:

  • targets real systems or people without clear authorization and scope
  • provides malware deployment, persistence, credential theft, evasion, or destructive intrusion steps
  • asks for or stores secrets in local memory files
  • modifies its own skill file

Data Storage

Local state lives in ~/cybersecurity/:

  • memory.md for stable scope, environment, and reporting preferences
  • environments.md for system maps, critical assets, and trust boundaries
  • incidents.md for active timelines, hypotheses, and containment state
  • findings.md for reusable finding patterns and mitigation notes
  • notes.md for temporary investigation breadcrumbs

Security & Privacy

  • This skill is designed for authorized cybersecurity work only.
  • It does not require network access by itself and does not call undeclared external services.
  • It should avoid copying secrets, tokens, private keys, or raw sensitive data into local notes.
  • When evidence contains sensitive data, summarize the minimum needed for analysis and reporting.
  • For real environments, it should preserve evidence, record assumptions, and state when authorization is missing or unclear.

Related Skills

Install with clawhub install <slug> if user confirms:

  • auth — Review authentication flows, credentials, and session boundaries
  • authorization — Reason about permissions, access control, and privilege separation
  • network — Map traffic paths, network behavior, and trust boundaries
  • cloud — Analyze cloud architecture, IAM exposure, and platform-level controls
  • api — Review API surfaces, abuse cases, and contract-level security gaps

Feedback

  • If useful: clawhub star cybersecurity
  • Stay updated: clawhub sync

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

Rune — Skill Mesh

Performs adversarial red-team analysis on approved plans to identify edge cases, security risks, scalability issues, error paths, and integration risks befor...

Registry SourceRecently Updated
Security

Clawexchange

Agent Exchange — Infrastructure for the agent economy. Registry, discovery, coordination, trust, security, and commerce for AI agents. 116 API endpoints. Fre...

Registry SourceRecently Updated
Security

Skill Scanner

Security checks for installing skills, packages, or plugins. Use BEFORE any `npm install`, `openclaw plugins install`, `clawhub install`, or similar install...

Registry SourceRecently Updated
00Profile unavailable
Security

proof

A local-first cryptographic toolkit. Executes zero-knowledge proof (ZKP) generation, circuit compilation via SnarkJS/ZoKrates, and formal verification analys...

Registry SourceRecently Updated
1170Profile unavailable