it-risk-assessment-toolPerform comprehensive IT risk assessments across infrastructure, data protection, access control, compliance, incident response, and vendor management. Use w...
Install via ClawdBot CLI:
clawdbot install krishnakumarmahadevan-cmd/it-risk-assessment-toolGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Sends data to undocumented external endpoint (potential exfiltration)
POST → https://portal.toolweb.in/apis/security/it-risk-assessmentCalls external URL not in known-safe list
https://portal.toolweb.inAI Analysis
The skill sends user-provided security control maturity data to a documented, proprietary API for analysis, which is consistent with its stated purpose of performing IT risk assessments. While the external endpoint is not on a pre-approved list, there is no evidence of credential harvesting, hidden instructions, obfuscation, or exfiltration beyond the declared functionality for generating a risk report.
Audited Apr 17, 2026 · audit v1.0
Generated Mar 20, 2026
A hospital preparing for HIPAA compliance audit needs to evaluate its security controls maturity across data protection and access control domains. The tool assesses encryption, backup, and access review controls to generate a risk score and remediation roadmap for audit readiness.
A bank undergoing a regulatory examination must assess its infrastructure security, including network segmentation and firewall configurations. The tool provides a domain-level breakdown and prioritized actions to meet financial industry standards like FFIEC or PCI DSS.
An online retailer expanding its third-party vendor network uses the tool to evaluate vendor security assessments and contract requirements. It helps identify gaps in vendor monitoring and provides a risk score to mitigate supply chain threats.
A manufacturing firm with legacy systems needs to improve its incident response capabilities. The tool assesses IR plan maturity and security monitoring to create a roadmap for enhancing threat detection and response times against operational technology risks.
A fast-growing startup seeking SOC 2 certification uses the tool to score its overall IT risk across all domains. It generates a comprehensive assessment to prioritize controls like MFA and data encryption for investor and customer assurance.
Users pay a recurring fee for API key access, enabling continuous risk assessments and updates. Revenue is generated through tracked API calls, with tiered pricing based on usage volume and advanced features like detailed reporting.
Large organizations purchase site-wide licenses for unlimited assessments across multiple departments. This includes premium support, custom integrations, and dedicated account management, driving high-value contracts.
Security consultancies embed the tool into their service offerings, using it to streamline client assessments. Revenue comes from bundled service packages where the tool enhances delivery efficiency and provides standardized risk scoring.
💬 Integration Tip
Ensure curl is installed and TOOLWEB_API_KEY is set in the environment before making API calls to avoid errors and track usage for billing.
Scored Apr 19, 2026
Security vetting protocol before installing any AI agent skill. Red flag detection for credential theft, obfuscated code, exfiltration. Risk classification L...
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope,...
Comprehensive security auditing for Clawdbot deployments. Scans for exposed credentials, open ports, weak configs, and vulnerabilities. Auto-fix mode included.
Audit codebases and infrastructure for security issues. Use when scanning dependencies for vulnerabilities, detecting hardcoded secrets, checking OWASP top 10 issues, verifying SSL/TLS, auditing file permissions, or reviewing code for injection and auth flaws.
Audit a user's current AI tool stack. Score each tool by ROI, identify redundancies, gaps, and upgrade opportunities. Produces a structured report with score...
Detect anomalies and outliers in construction data: unusual costs, schedule variances, productivity spikes. Statistical and ML-based detection methods.