DISABLE_TELEMETRY=1 to opt out before using. ot-security-posture-scorecardAssess OT/ICS/SCADA security posture and generate risk scorecards with remediation guidance. Use when evaluating operational technology security, industrial...
Install via ClawdBot CLI:
clawdbot install krishnakumarmahadevan-cmd/ot-security-posture-scorecardGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Sends data to undocumented external endpoint (potential exfiltration)
POST → https://portal.toolweb.in:8443/security/itotassessorCalls external URL not in known-safe list
https://portal.toolweb.inAI Analysis
The skill sends user-provided OT security assessment data to a documented external API endpoint, which is consistent with its stated purpose. While the external domain is not on a pre-approved list, there is no evidence of hidden instructions, credential harvesting, or obfuscation. The primary risk is data privacy, as sensitive organizational information is transmitted to a third-party service.
Audited Apr 17, 2026 · audit v1.0
Generated Mar 21, 2026
A manufacturing company wants to evaluate its OT security posture to protect production lines from ransomware attacks. They need a scorecard to identify gaps in NIST CSF functions like detect and respond, and prioritize remediation for PLCs and HMIs.
An energy utility seeks to align with IEC 62443 standards for its SCADA systems managing power grids. They require a risk assessment to address OT-IT convergence issues and ensure compliance with regulatory frameworks like NERC CIP.
A water treatment plant needs to assess vulnerabilities in its OT environment, focusing on critical infrastructure protection. The goal is to generate a scorecard highlighting top risks and a remediation roadmap for monitoring and access controls.
A pharmaceutical company with integrated IT-OT networks wants to evaluate security maturity using NIST CSF scores. They aim to identify gaps in asset management and incident response to safeguard production processes from cyber threats.
A transportation agency managing rail or traffic control systems requires an OT security assessment to mitigate risks from increasing IT-OT integration. The scorecard will provide prioritized actions based on threat concerns like unauthorized access.
Users pay a monthly fee (e.g., ₹2,999 or ~$36) for API key access to generate unlimited scorecards. This model ensures recurring revenue and supports ongoing tool maintenance and updates.
Offer custom enterprise licenses for large organizations needing bulk assessments or integration with existing security tools. This includes premium support and tailored compliance reporting for sectors like energy and manufacturing.
Provide additional consulting services for in-depth assessments, remediation implementation, or training based on scorecard results. This leverages the tool as a lead generator for higher-value security engagements.
💬 Integration Tip
Ensure the TOOLWEB_API_KEY is securely stored in environment variables and use curl with proper error handling to manage API responses like 401 or 429 errors.
Scored Apr 19, 2026
Security vetting protocol before installing any AI agent skill. Red flag detection for credential theft, obfuscated code, exfiltration. Risk classification L...
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope,...
Comprehensive security auditing for Clawdbot deployments. Scans for exposed credentials, open ports, weak configs, and vulnerabilities. Auto-fix mode included.
Audit codebases and infrastructure for security issues. Use when scanning dependencies for vulnerabilities, detecting hardcoded secrets, checking OWASP top 10 issues, verifying SSL/TLS, auditing file permissions, or reviewing code for injection and auth flaws.
Audit a user's current AI tool stack. Score each tool by ROI, identify redundancies, gaps, and upgrade opportunities. Produces a structured report with score...
Detect anomalies and outliers in construction data: unusual costs, schedule variances, productivity spikes. Statistical and ML-based detection methods.