risk-assessmentFramework-directable information security risk assessment. Identifies threats, evaluates likelihood/impact via a 3x3 matrix, maps findings to any compliance...
Install via ClawdBot CLI:
clawdbot install Dangsllc/risk-assessmentGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Generated Mar 20, 2026
A hospital's electronic health record system storing ePHI needs assessment against HIPAA Security Rule. The skill identifies threats like unauthorized access, evaluates impact as high due to regulated data, and maps findings to HIPAA controls for breach prevention.
An online retailer processing credit card payments requires PCI DSS compliance. The skill assesses vulnerabilities in payment gateways, classifies cardholder data as regulated, and recommends remediation like encryption to reduce risk scores.
A cloud-based software company seeking SOC 2 certification uses the skill to evaluate data security controls. It identifies risks in multi-tenant environments, maps to SOC 2 trust principles, and prioritizes fixes for customer trust.
A manufacturing plant with industrial control systems needs ISO 27001 alignment. The skill assesses threats like supply chain attacks, classifies production systems as business-critical, and suggests risk treatments to protect operational technology.
A bank handling EU customer PII must comply with GDPR. The skill identifies data processing risks, biases impact scores upward for regulated data, and maps findings to GDPR articles to support privacy-by-design initiatives.
Managed service providers offering ongoing risk assessments and compliance monitoring to clients. The skill automates framework mapping and reporting, reducing manual effort and enabling scalable subscription revenue.
Security consultants use the skill to deliver formal risk assessments for audits or regulatory requirements. It standardizes evaluations across clients, improving consistency and billable hours for compliance projects.
Large enterprises integrate the skill into internal security teams for continuous risk management. It helps prioritize remediation efforts and supports board-level reporting, reducing breach costs and insurance premiums.
💬 Integration Tip
Use the argument-hint to specify frameworks like 'frameworks/iso-27001-controls.md' for tailored mapping, and ensure input includes system boundaries for accurate asset classification.
Scored Apr 19, 2026
Security vetting protocol before installing any AI agent skill. Red flag detection for credential theft, obfuscated code, exfiltration. Risk classification L...
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope,...
Comprehensive security auditing for Clawdbot deployments. Scans for exposed credentials, open ports, weak configs, and vulnerabilities. Auto-fix mode included.
Audit codebases and infrastructure for security issues. Use when scanning dependencies for vulnerabilities, detecting hardcoded secrets, checking OWASP top 10 issues, verifying SSL/TLS, auditing file permissions, or reviewing code for injection and auth flaws.
Audit a user's current AI tool stack. Score each tool by ROI, identify redundancies, gaps, and upgrade opportunities. Produces a structured report with score...
Detect anomalies and outliers in construction data: unusual costs, schedule variances, productivity spikes. Statistical and ML-based detection methods.