gov-cybersecurityCVE vulnerability lookup via NIST NVD, CISA KEV, EPSS scores, and MITRE ATT&CK. 7 tools for real-time cybersecurity intelligence.
Install via ClawdBot CLI:
clawdbot install martc03/gov-cybersecurityRequires:
Grade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Calls external URL not in known-safe list
https://github.com/martc03/gov-mcp-serversAudited Apr 16, 2026 · audit v1.0
Generated Mar 11, 2026
Security analysts use the skill to quickly assess and prioritize vulnerabilities by looking up CVEs to get CVSS scores, EPSS probabilities, and KEV status, enabling efficient patch management decisions based on real-time threat intelligence.
Contractors serving federal agencies utilize the skill to track CISA KEV deadlines and ensure timely patching of vulnerabilities, helping maintain compliance with cybersecurity regulations and avoid penalties.
Procurement teams leverage the skill to search for vulnerabilities associated with specific vendors or products, cross-referencing with KEV data to evaluate security risks before purchasing or renewing software contracts.
Security Operations Centers use the skill to generate reports on trending critical CVEs and recently exploited vulnerabilities from KEV, providing actionable intelligence for threat hunting and incident response planning.
Healthcare IT staff employ the skill to identify high-risk vulnerabilities in medical devices or software by checking EPSS scores and KEV status, ensuring critical systems are patched first to protect patient data and safety.
Offer basic vulnerability lookup and search for free to attract users, then charge for advanced features like automated reporting, API access, or integration with ticketing systems, generating revenue through subscription tiers.
Provide cybersecurity consulting services that utilize the skill for vulnerability assessments and compliance audits, charging clients on a project or retainer basis for expert analysis and remediation guidance.
Aggregate and enhance the free government data with proprietary analytics, then license the enriched intelligence via APIs to other security tools or platforms, earning revenue through API usage fees or licensing agreements.
💬 Integration Tip
Integrate this skill into existing security workflows by using the MCP server setup to automate vulnerability checks in CI/CD pipelines or ticketing systems, ensuring real-time updates without manual intervention.
Scored Apr 18, 2026
Information Security Management System (ISMS) audit expert for ISO 27001 compliance verification, security control assessment, and certification support. Use...
ISO 13485 internal audit expertise for medical device QMS. Covers audit planning, execution, nonconformity classification, and CAPA verification. Use for int...
Safely triage and remediate GitHub dependency hygiene issues with explicit guardrails. Use when Dependabot PRs fail, pnpm lockfiles break, transitive vulnerabilities appear (e.g., glob/lodash/brace-expansion), or CI/Vercel fails due to dependency resolution. Prioritize low-risk fixes, branch+PR workflow, and plain-English explanations.
Prioritize vulnerability remediation using KEV-style exploitation context plus asset criticality. Use for CVE triage, patch order decisions, and remediation...
AI-native GRC (Governance, Risk, and Compliance) for OpenClaw. 97 actions across 13 frameworks including SOC 2, ISO 27001, HIPAA, GDPR, NIST CSF, PCI DSS, CI...
Local-first, event-driven RAG for commercial real estate audit & investigation case folders. Index a case directory named like "项目问题编号__标题" (with stage subfolders such as 01_policy_basis/02_process/04_settlement_payment) and query it with citations (file:// links + PDF