seithar-intelProvides real-time cyber and cognitive security threat intelligence, scoring and briefing relevant news, vulnerabilities, exploits, and influence operations...
Install via ClawdBot CLI:
clawdbot install Mirai8888/seithar-intelA personal cyber threat intelligence and cognitive security analyst for OpenClaw. Monitors RSS feeds for security news, vulnerability disclosures, exploit drops, and influence operation reports. Scores items against your interests, delivers daily briefings, and provides on-demand deep-dive analysis of any threat β technical or cognitive.
This is ThreatMouth in your pocket. Cyber + cognitive security awareness from any chat app.
This skill turns your OpenClaw into a threat intelligence analyst that:
The operator should configure the following in their OpenClaw settings or by telling the agent directly:
Tell your OpenClaw your security interests and it will calibrate scoring. Example:
My security interests are:
- Malware analysis and reverse engineering
- Social engineering and cognitive security
- Network exploitation
- OSINT and intelligence gathering
- Influence operations and information warfare
- Vulnerability research and exploit development
I'm currently studying:
- MITRE ATT&CK framework
- DISARM framework for influence operations
- Python security tooling
- OverTheWire wargames
My skill level: intermediate
Deprioritize:
- Enterprise compliance and GRC
- Cloud IAM and AWS security
- Vendor marketing announcements
- Corporate breach notifications unless technically interesting
The skill stores this profile in memory and uses it to score every feed item for relevance.
Default schedule (configurable):
Tell your OpenClaw: "Change my briefing time to 9 AM and 7 PM" or "Only send critical alerts, no scheduled briefings"
Default: every 2 hours. The skill uses OpenClaw's cron/heartbeat system to periodically fetch and process feeds.
On each check interval, the skill instructs the agent to:
web_fetch toolEach new item is scored 0.0 to 1.0 against the operator's profile:
The agent scores by examining the item's title, summary, source, and any CVE/technique references against the stored interest profile. No external API needed β the LLM does the scoring inline.
Items are categorized into:
ββββββββββββββββββββββββββββββββββββββββββββββββββββ
β SEITHAR INTELLIGENCE BRIEFING β
β 2026-02-11 08:00 EST β
ββββββββββββββββββββββββββββββββββββββββββββββββββββ
CRITICAL (act now):
π΄ [0.95] Pre-auth RCE in OpenSSH (CVE-2026-XXXXX)
Full Disclosure | 2h ago
Affects OpenSSH 9.x. Public PoC available.
βΈ Say "deep dive CVE-2026-XXXXX" for full analysis
HIGH RELEVANCE:
π [0.87] Lazarus Group deploys new social engineering
toolkit targeting crypto developers
The Hacker News | 4h ago
DISARM: T0047 (Develop Content), ATT&CK: T1566.001
βΈ Say "deep dive lazarus social engineering" for analysis
π [0.82] New Nuclei templates for Spring4Shell variants
Exploit-DB | 6h ago
12 new detection templates + PoC payloads
βΈ Say "explain spring4shell" for context
π [0.78] Russian influence operation targeting NATO
narratives detected across 3 platforms
DFRLab | 5h ago
DISARM: T0046, T0048, T0056 | Coordinated inauthentic behavior
βΈ Say "deep dive nato influence op" for DISARM breakdown
STUDY RECOMMENDATION:
Based on today's feed: review SSH key exchange internals
and pre-authentication attack surfaces. OverTheWire Bandit
levels 14-17 cover SSH fundamentals.
ββββββββββββββββββββββββββββββββββββββββββββββββββ
24 items collected | 4 high relevance | 1 critical
Seithar Intelligence Division v1.0
θͺη₯δ½ζ¦ | seithar.com/research
ββββββββββββββββββββββββββββββββββββββββββββββββββ
When the operator says "deep dive [topic]" or "explain [CVE]", the skill:
web_fetchhttps://api.github.com/search/repositories?q=CVE-XXXX-XXXXX&sort=stars)ββββββββββββββββββββββββββββββββββββββββββββββββββββ
β SEITHAR DEEP DIVE β
β CVE-2026-XXXXX β OpenSSH Pre-Auth RCE β
ββββββββββββββββββββββββββββββββββββββββββββββββββββ
WHAT HAPPENED:
A memory corruption vulnerability in OpenSSH's key exchange
handler allows unauthenticated attackers to achieve remote
code execution as root. No credentials required.
HOW THE EXPLOIT WORKS:
1. Attacker connects to SSH port 22
2. During key exchange (before authentication), sends
oversized payload in the KEX_INIT message
3. Buffer overflow overwrites return address on stack
4. Execution redirected to attacker's shellcode
5. Root shell achieved β no credentials needed
Pseudocode:
connect(target, 22)
send(kex_init_with_overflow_payload)
# Stack is now corrupted
# Return address points to shellcode
# Root shell spawns
MITRE ATT&CK:
T1190 β Exploit Public-Facing Application
T1068 β Exploitation for Privilege Escalation
PROOF OF CONCEPT:
β 234 github.com/researcher/CVE-2026-XXXXX (Python)
β 45 github.com/other/openssh-rce-poc (C)
Key file to study: exploit.py lines 40-80 (payload construction)
CONCEPTS TO UNDERSTAND:
β Stack-based buffer overflow (study: OverTheWire Narnia)
β SSH key exchange protocol (RFC 4253)
β ASLR bypass techniques
β Return-oriented programming (ROP)
LAB EXERCISE:
docker pull vulhub/openssh:9.x
Practice in isolated environment. Never test against
production systems.
DEFENSIVE PERSPECTIVE:
Detection: Anomalous packet sizes during SSH handshake
Prevention: Upgrade to OpenSSH 9.x.x, restrict SSH access
Log analysis: Look for connection resets during KEX phase
ββββββββββββββββββββββββββββββββββββββββββββββββββ
Seithar Intelligence Division v1.0
θͺη₯δ½ζ¦ | seithar.com/research
ββββββββββββββββββββββββββββββββββββββββββββββββββ
For influence operations, the deep dive maps to DISARM instead:
ββββββββββββββββββββββββββββββββββββββββββββββββββββ
β SEITHAR DEEP DIVE β COGNITIVE β
β Russian NATO Narrative Operation β
ββββββββββββββββββββββββββββββββββββββββββββββββββββ
WHAT HAPPENED:
Coordinated inauthentic behavior detected across Twitter/X,
Telegram, and Facebook targeting NATO unity narratives in
Baltic states. ~200 accounts activated within 48h window.
DISARM MAPPING:
Plan:
T0073 β Determine Target Audiences (Baltic publics)
T0047 β Develop Content (localized memes, fake news articles)
Prepare:
T0048 β Develop Online Personas (aged accounts reactivated)
T0046 β Use Existing Narratives (energy costs, immigration)
Execute:
T0049 β Flood Information Space
T0056 β Amplify Existing Content (cross-platform coordination)
TECHNIQUES DETECTED:
βΈ Narrative Piggybacking β latched onto real energy cost
concerns, added fabricated escalation claims
βΈ Coordinated Amplification β same framing appeared across
platforms within 2-hour window, suggesting central dispatch
βΈ Emotional Anchoring β content led with fear/anger triggers
before introducing anti-NATO framing
SEITHAR TAXONOMY:
SCT-003 (Substrate Priming) β Initial wave didn't carry
explicit anti-NATO messaging. It primed emotional state
(anxiety about energy costs) so subsequent waves could
introduce the geopolitical framing.
SCT-005 (Amplification Embedding) β Content designed so
that debunking it still spreads the core claim.
SCT-007 (Wetiko Pattern) β Target audiences began
reproducing the framing as "their own analysis" within
48h of initial exposure.
DEFENSIVE PERSPECTIVE:
Inoculation: Pre-bunking energy cost narratives with
accurate data before the operation gains traction.
Detection: Monitor for coordinated posting patterns
(same framing, multiple accounts, tight time window).
Counter: Highlight the coordination pattern itself rather
than debunking individual claims.
ββββββββββββββββββββββββββββββββββββββββββββββββββ
Seithar Intelligence Division v1.0
θͺη₯δ½ζ¦ | seithar.com/research
ββββββββββββββββββββββββββββββββββββββββββββββββββ
| Source | Feed URL | Category |
|--------|----------|----------|
| The Hacker News | https://feeds.feedburner.com/TheHackersNews | general, malware, exploit |
| BleepingComputer | https://www.bleepingcomputer.com/feed/ | general, malware |
| Krebs on Security | https://krebsonsecurity.com/feed/ | general, cybercrime |
| CISA Alerts | https://www.cisa.gov/cybersecurity-advisories/all.xml | critical, advisory |
| Full Disclosure | https://seclists.org/rss/fulldisclosure.rss | exploit, disclosure |
| oss-security | https://seclists.org/rss/oss-sec.rss | exploit, disclosure |
| Exploit-DB | https://www.exploit-db.com/rss.xml | exploit, poc |
| SANS ISC | https://isc.sans.edu/rssfeed.xml | general, technique |
| PacketStorm | https://packetstormsecurity.com/feeds/headlines.xml | exploit, tools |
| Schneier on Security | https://www.schneier.com/feed/ | commentary, crypto |
| Dark Reading | https://www.darkreading.com/rss.xml | general, enterprise |
| Source | Feed URL | Category |
|--------|----------|----------|
| EUvsDisinfo | https://euvsdisinfo.eu/feed/ | influence_op, disinfo |
| Bellingcat | https://www.bellingcat.com/feed/ | osint, investigation |
| DFRLab (Atlantic Council) | https://www.atlanticcouncil.org/category/digital-forensic-research-lab/feed/ | influence_op, analysis |
| RAND Cyber/Info | https://www.rand.org/topics/cyber-and-data-sciences.xml | research, policy |
| Recorded Future (Insikt) | https://www.recordedfuture.com/feed | threat_intel, apt |
| Source | Feed URL | Category |
|--------|----------|----------|
| r/netsec | https://www.reddit.com/r/netsec/.rss | community, technique |
| r/ReverseEngineering | https://www.reddit.com/r/ReverseEngineering/.rss | re, technique |
| Project Zero | https://googleprojectzero.blogspot.com/feeds/posts/default | research, exploit |
| Malwarebytes Labs | https://www.malwarebytes.com/blog/feed | malware, consumer |
| Troy Hunt | https://www.troyhunt.com/rss/ | general, web_security |
| Graham Cluley | https://grahamcluley.com/feed/ | general, commentary |
| Risky Business | https://risky.biz/feeds/risky-business/ | podcast, commentary |
The operator can add or remove sources by telling the agent: "Add this RSS feed to my threat sources: [url]" or "Remove Dark Reading from my feeds."
The skill uses OpenClaw's persistent memory to track:
{
"seithar_intel": {
"profile": {
"interests": ["malware analysis", "social engineering", "network exploitation"],
"skill_level": "intermediate",
"currently_studying": ["MITRE ATT&CK", "DISARM", "OverTheWire"],
"deprioritize": ["enterprise compliance", "cloud IAM"]
},
"feeds": {
"sources": ["list of active RSS URLs"],
"custom_sources": ["user-added URLs"],
"check_interval_hours": 2,
"briefing_times": ["08:00", "18:00"]
},
"seen_items": {
"url_hashes": ["hash1", "hash2"],
"last_check": "2026-02-11T14:00:00Z",
"items_today": 24,
"high_relevance_today": 4
},
"stats": {
"total_items_processed": 1847,
"deep_dives_requested": 23,
"top_sources_by_relevance": {
"fulldisclosure": 0.82,
"exploit_db": 0.79,
"euvsdisinfo": 0.76
},
"most_seen_techniques": {
"T1566.001": 12,
"T0049": 8,
"T1190": 7
}
},
"study_log": {
"deep_dives_completed": ["CVE-2026-XXXXX", "lazarus_social_engineering"],
"techniques_studied": ["T1190", "T0049", "SCT-003"],
"recommended_next": "SSH key exchange internals"
}
}
}
Using OpenClaw's heartbeat/cron system, the skill proactively:
The agent reads this and knows how to operate. No external code needed β OpenClaw's built-in web_fetch, web_search, memory, and cron tools handle everything.
List of RSS feed URLs with categories and check intervals. The agent reads this file when performing feed checks.
Reference list of DISARM techniques with IDs, names, and one-line descriptions. The agent uses this to map influence operations to framework codes.
Reference list of MITRE ATT&CK techniques (top 50 most relevant). Used for technique mapping in deep dives.
SCT-001 through SCT-007 Seithar Cognitive Defense Taxonomy. Used in cognitive security analysis.
clawhub install seithar-intel
Or manually:
git clone https://github.com/Mirai8888/seithar-intel
# Copy to your OpenClaw skills directory
cp -r seithar-intel ~/clawd/skills/
Then tell your OpenClaw: "Set up my security interest profile" and describe your interests.
Every output carries:
ββββββββββββββββββββββββββββββββββββββββββββββββββ
Seithar Intelligence Division v1.0
θͺη₯δ½ζ¦ | seithar.com/research
ββββββββββββββββββββββββββββββββββββββββββββββββββ
When users screenshot briefings and share them, the brand travels. When they say "my Seithar feed flagged this," the terminology propagates. The skill is the distribution channel.
seithar-intel is the lightweight personal version of ThreatMouth (the full Discord bot). It uses the same scoring methodology, the same source list, and the same educational deep-dive format, but runs entirely within OpenClaw on the operator's machine.
seithar-cogdef (separate skill) handles analysis of specific content for manipulation. seithar-intel handles the ongoing feed of threats and cognitive security events.
Together they provide: continuous awareness (intel) + on-demand analysis (cogdef).
Install both:
clawhub install seithar-intel
clawhub install seithar-cogdef
θͺη₯δ½ζ¦ | seithar.com
AI Usage Analysis
Analysis is being generated⦠refresh in a few seconds.
Set up and use 1Password CLI (op). Use when installing the CLI, enabling desktop app integration, signing in (single or multi-account), or reading/injecting/running secrets via op.
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope, and suspicious patterns.
Perform a comprehensive read-only security audit of Clawdbot's own configuration. This is a knowledge-based skill that teaches Clawdbot to identify hardening opportunities across the system. Use when user asks to "run security check", "audit clawdbot", "check security hardening", or "what vulnerabilities does my Clawdbot have". This skill uses Clawdbot's internal capabilities and file system access to inspect configuration, detect misconfigurations, and recommend remediations. It is designed to be extensible - new checks can be added by updating this skill's knowledge.
Use when reviewing code for security vulnerabilities, implementing authentication flows, auditing OWASP Top 10, configuring CORS/CSP headers, handling secrets, input validation, SQL injection prevention, XSS protection, or any security-related code review.
Security check for ClawHub skills powered by Koi. Query the Clawdex API before installing any skill to verify it's safe.
Scan Clawdbot and MCP skills for malware, spyware, crypto-miners, and malicious code patterns before you install them. Security audit tool that detects data exfiltration, system modification attempts, backdoors, and obfuscation techniques.