threat-assessment-defense-guideGenerate comprehensive cybersecurity threat assessments and defense guides. Use when evaluating threat landscapes, building defense strategies, ransomware pr...
Install via ClawdBot CLI:
clawdbot install krishnakumarmahadevan-cmd/threat-assessment-defense-guideGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Sends data to undocumented external endpoint (potential exfiltration)
POST → https://portal.toolweb.in/apis/security/threat-assessment-defenseCalls external URL not in known-safe list
https://portal.toolweb.inAI Analysis
The skill explicitly requires an API key and sends data to a documented external endpoint (portal.toolweb.in) for its core, stated functionality of generating threat assessments. While the external domain is not on a pre-approved list, there is no evidence of credential harvesting, hidden instructions, or obfuscation. The primary risk is sending potentially sensitive organizational data to a third-party service.
Audited Apr 17, 2026 · audit v1.0
Generated Mar 21, 2026
A hospital needs to protect patient data and critical systems from ransomware attacks. This scenario involves assessing ransomware threats targeting endpoints and databases, and generating a defense guide with encryption protection, backup strategies, and staff training.
A financial institution seeks to defend against phishing campaigns aimed at stealing credentials and sensitive data. The assessment covers email security, user awareness training, and multi-factor authentication to reduce social engineering risks.
A government agency requires defense against advanced persistent threats (APTs) targeting network infrastructure and sensitive information. This involves threat modeling, intrusion detection systems, and incident response planning for long-term security.
A manufacturing company wants to secure its supply chain from cyber attacks that could disrupt operations. The assessment focuses on vendor risk management, IoT device protection, and monitoring for anomalies in industrial control systems.
A tech startup needs to defend cloud infrastructure against DDoS and data exfiltration threats. This scenario includes evaluating cloud-native security tools, access controls, and compliance measures to safeguard web applications and databases.
Monetizes through API calls for threat assessments, with billing based on usage. Users pay per assessment, encouraging frequent use for security planning and generating recurring revenue from subscriptions.
Offers custom licenses to large organizations for unlimited access to threat assessments and defense guides. Includes premium support and integration services, targeting sectors like healthcare and finance with high security needs.
Provides a free trial with limited assessments to attract users, then upsells to paid plans for advanced features like detailed reports and priority API access. Drives adoption through the portal and converts free users to paying customers.
💬 Integration Tip
Ensure curl is installed and TOOLWEB_API_KEY is set in the environment; use the API endpoint with proper JSON formatting for threatOptions to avoid errors.
Scored Apr 19, 2026
Security vetting protocol before installing any AI agent skill. Red flag detection for credential theft, obfuscated code, exfiltration. Risk classification L...
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope,...
Comprehensive security auditing for Clawdbot deployments. Scans for exposed credentials, open ports, weak configs, and vulnerabilities. Auto-fix mode included.
Audit codebases and infrastructure for security issues. Use when scanning dependencies for vulnerabilities, detecting hardcoded secrets, checking OWASP top 10 issues, verifying SSL/TLS, auditing file permissions, or reviewing code for injection and auth flaws.
Audit a user's current AI tool stack. Score each tool by ROI, identify redundancies, gaps, and upgrade opportunities. Produces a structured report with score...
Detect anomalies and outliers in construction data: unusual costs, schedule variances, productivity spikes. Statistical and ML-based detection methods.