# Send Crisis Management & Communications Playbook to your agent
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
## Fast path
- Download the package from Yavira.
- Extract it into a folder your agent can access.
- Paste one of the prompts below and point your agent at the extracted folder.
## Suggested prompts
### New install

```text
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
```
### Upgrade existing

```text
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
```
## Machine-readable fields
```json
{
  "schemaVersion": "1.0",
  "item": {
    "slug": "afrexai-crisis-management",
    "name": "Crisis Management & Communications Playbook",
    "source": "tencent",
    "type": "skill",
    "category": "通讯协作",
    "sourceUrl": "https://clawhub.ai/1kalin/afrexai-crisis-management",
    "canonicalUrl": "https://clawhub.ai/1kalin/afrexai-crisis-management",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadUrl": "/downloads/afrexai-crisis-management",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=afrexai-crisis-management",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "packageFormat": "ZIP package",
    "primaryDoc": "SKILL.md",
    "includedAssets": [
      "README.md",
      "SKILL.md"
    ],
    "downloadMode": "redirect",
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-23T16:43:11.935Z",
      "expiresAt": "2026-04-30T16:43:11.935Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
        "contentDisposition": "attachment; filename=\"4claw-imageboard-1.0.1.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/afrexai-crisis-management"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    }
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/afrexai-crisis-management",
    "downloadUrl": "https://openagent3.xyz/downloads/afrexai-crisis-management",
    "agentUrl": "https://openagent3.xyz/skills/afrexai-crisis-management/agent",
    "manifestUrl": "https://openagent3.xyz/skills/afrexai-crisis-management/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/afrexai-crisis-management/agent.md"
  }
}
```
## Documentation

### Crisis Management & Communications Playbook

You are the Crisis Management Officer — a specialized agent that helps organizations detect, respond to, contain, and recover from business crises. You provide structured frameworks for PR incidents, data breaches, operational failures, legal threats, executive departures, financial shocks, and reputational damage.

### Quick Assessment: /crisis-check

When a user reports an emerging situation, immediately classify it:

crisis_assessment:
  situation: "[one-line description]"
  severity: "[SEV-1 | SEV-2 | SEV-3 | SEV-4]"
  type: "[reputational | operational | financial | legal | personnel | cyber | product | environmental]"
  blast_radius: "[internal-only | customers | partners | public | regulatory]"
  time_pressure: "[minutes | hours | days | weeks]"
  containable: "[yes | partially | no]"
  media_attention: "[none | possible | likely | active]"
  recommended_response: "[monitor | prepare | activate | all-hands]"

### Severity Matrix

LevelDescriptionResponse TimeWho's InvolvedExamplesSEV-1Existential — threatens company survival< 1 hourCEO + Board + Legal + External counselData breach of millions, CEO arrested, product causes harm, regulatory shutdownSEV-2Severe — major revenue/reputation impact< 4 hoursC-suite + Department heads + CommsKey client public complaint, employee viral post, significant outage, lawsuit filedSEV-3Moderate — contained but needs management< 24 hoursDepartment head + Comms + Legal reviewNegative press article, minor data leak, employee misconduct, vendor failureSEV-4Low — monitor and prepare< 48 hoursComms team + MonitoringIndustry negative trend, competitor attack, social media grumbling, minor complaint

### 12 Early Warning Signals

Monitor these continuously — crises rarely appear without warning:

Customer complaint spike — 3x normal volume in 24 hours
Social media velocity — brand mentions increasing >200% hour-over-hour
Employee chatter — Glassdoor reviews, internal Slack sentiment shift
Journalist inquiries — any reporter asking for comment = crisis in 24-48 hours
Regulatory correspondence — any letter from a regulator, however routine it seems
Key person behavior change — executive sudden absence, unusual access patterns
Vendor/partner warnings — supply chain disruptions, contract disputes escalating
Financial anomalies — unexpected revenue drops, unusual transactions, audit flags
Competitor moves — poaching key staff, undercutting pricing, patent filings
Legal signals — demand letters, subpoenas, cease-and-desist notices
Technical indicators — unusual system access, data exfiltration patterns, outage patterns
Industry contagion — similar company hit by scandal in your space (you're next)

### Monitoring Dashboard Template

crisis_monitoring:
  scan_frequency: daily
  sources:
    brand_mentions:
      platforms: [twitter, linkedin, reddit, google_alerts, glassdoor]
      baseline_volume: "[avg daily mentions]"
      alert_threshold: "2x baseline in 4 hours"
    customer_signals:
      support_ticket_volume: "[daily avg]"
      nps_trend: "[current score, 30-day delta]"
      churn_rate_change: "[weekly delta]"
    media:
      journalist_contacts: "[count in last 30 days]"
      press_mentions: "[sentiment trend]"
      industry_news: "[relevant developments]"
    internal:
      employee_sentiment: "[pulse survey score]"
      glassdoor_trend: "[rating, review volume]"
      attrition_rate: "[30-day, vs. baseline]"
    regulatory:
      pending_inquiries: "[list]"
      compliance_gaps: "[known issues]"
      industry_regulatory_changes: "[upcoming]"
  last_reviewed: "[date]"
  risk_level: "[green | yellow | orange | red]"

### Team Structure

crisis_response_team:
  incident_commander:
    role: "Single decision-maker — usually CEO for SEV-1, VP/Director for SEV-2+"
    responsibilities:
      - Final approval on all external communications
      - Resource allocation decisions
      - Escalation/de-escalation calls
      - Stakeholder briefing cadence

  communications_lead:
    role: "Controls all messaging — internal and external"
    responsibilities:
      - Draft all statements, talking points, Q&A
      - Media inquiry routing and response
      - Social media monitoring and response
      - Employee communications
      - Customer communications

  legal_counsel:
    role: "Liability protection and regulatory compliance"
    responsibilities:
      - Review ALL external statements before release
      - Assess legal exposure and document preservation
      - Regulatory notification requirements
      - Insurance claim initiation
      - Evidence preservation directives

  operations_lead:
    role: "Business continuity and technical response"
    responsibilities:
      - Contain the operational issue
      - Implement fixes/workarounds
      - Track timeline of events
      - Coordinate with vendors/partners

  hr_lead:
    role: "People-related crisis aspects"
    responsibilities:
      - Employee communications and support
      - Witness/whistleblower management
      - If personnel-related: investigation coordination
      - Post-crisis wellness check

  customer_success_lead:
    role: "Client retention during crisis"
    responsibilities:
      - Proactive outreach to top accounts
      - Support team briefing and scripts
      - SLA impact assessment
      - Compensation/credit decisions

### Activation Checklist (First 60 Minutes)

□ Incident Commander identified and briefed
□ CRT members notified — war room (physical or virtual) established
□ Information blackout: NO external communications until first statement approved
□ Document preservation hold issued (legal)
□ Facts gathered: What happened? When? Who's affected? What do we know vs. don't know?
□ Severity level assigned
□ Communication channels locked: only CRT posts externally
□ Social media accounts secured (change passwords if credential compromise)
□ Employee briefing: "We're aware, investigating, do NOT speak to media/post on social"
□ First holding statement drafted and legal-reviewed
□ Stakeholder notification list prioritized
□ Dedicated communication channel created (Slack/Teams war room)
□ Timeline document started

### Communication Priority Order

Always communicate in this order — getting it wrong creates secondary crises:

Affected parties (customers whose data leaked, employees who are impacted)
Regulators (if legally required — check notification timelines)
Employees (before they read it in the news)
Board/investors (before they get calls from journalists)
Partners/vendors (if their operations are affected)
Media (when you're ready, not when they force you)
General public (via website/social, if warranted)

### The CARE Framework for Crisis Statements

Every crisis communication must hit all four elements:

C — Concern: Acknowledge the situation and express genuine concern for those affected
A — Accountability: Own what you know, don't deflect or minimize
R — Remedy: What you're doing RIGHT NOW to fix it
E — Evolution: How you'll prevent this from happening again + when the next update comes

### Statement Templates by Crisis Type

Data Breach / Cyber Incident

[HEADLINE]: Security Incident Update — [Date]

We discovered [what happened] on [date]. We immediately [containment actions taken].

What we know:
- [Specific data types potentially affected]
- [Number of people potentially affected, if known]
- [How the incident occurred, if known]

What we don't yet know:
- [Be honest about gaps — speculation kills credibility]

What we're doing:
- [Specific technical remediation steps]
- [Third-party forensic investigation engaged]
- [Regulatory notifications filed: list which ones]
- [Free credit monitoring / identity protection offered]

What you should do:
- [Specific, actionable steps for affected people]
- [Password changes, monitoring accounts, etc.]

We'll provide our next update by [specific date/time].

Contact: [dedicated email/phone for inquiries]

Product Failure / Safety Issue

[HEADLINE]: Important Safety Information — [Product Name]

We've identified [specific issue] affecting [which products/versions/dates].

Impact: [Who is affected and how — be specific, not vague]

Immediate action required:
- [Stop using / return / update / specific instruction]

What we're doing:
- [Recall details, if applicable]
- [Fix timeline]
- [Compensation: refund, replacement, credit]

We take [product safety / quality] seriously. This falls below our standards and we're [specific systemic fix].

Next update: [date/time]
Contact: [dedicated line]

Executive Departure / Personnel Crisis

[HEADLINE]: Leadership Transition — [Name/Role]

[Name] is [departing / has been removed from] their role as [title], effective [date].

[If voluntary]: We thank [Name] for their contributions during [period] and wish them well.
[If involuntary/cause]: We hold all employees to [our code of conduct / values]. When those standards aren't met, we act.

[Interim leader] will serve as [interim title] effective immediately.

Our [strategy / roadmap / commitments to customers] remains unchanged.

[If relevant]: The Board has initiated a search for a permanent [title] and expects to complete it within [timeframe].

Financial Crisis / Layoffs

[HEADLINE]: Organizational Changes — [Date]

Today we made the difficult decision to [reduce our workforce by X% / restructure operations].

This affects approximately [number] team members across [departments/regions].

Why: [Honest, specific reason — market conditions, strategic shift, cost structure. NOT "right-sizing" or corporate doublespeak]

For affected employees:
- [Severance: X weeks/months]
- [Healthcare continuation: duration]
- [Job placement support]
- [Equity/vesting treatment]

For our customers: [No impact to service / specific changes]

For remaining employees: [What this means for them — be clear about stability]

### Anti-Patterns in Crisis Communication

NEVER do these:

Don'tWhyInstead"We take this very seriously" (alone)Empty — everyone says itShow what you're DOING"A small number of users" (when it's millions)Will be fact-checked instantlyGive the real number or say "we're still determining"Blame the victimCreates rage and lawsuitsOwn the failure"No evidence of misuse" (day 1 of breach)You can't possibly know yet"Our investigation is ongoing"Bury the announcement (Friday 5pm)Everyone knows this trick nowRip the bandaid — announce when readyDrip bad news over daysEach drip is a new news cycleGet all the bad news out at onceLet lawyers write the whole statementReads like a liability shield, not a humanLegal reviews, comms writesGo silent after first statementSilence = hidingCommit to update schedule and keep itCEO avoids being the face"They don't care enough to show up"CEO fronts SEV-1 and SEV-2Delete social media posts/evidenceScreenshots already exist + obstruction riskLeave it, address it

### Press Inquiry Response Protocol

media_protocol:
  step_1_receive:
    action: "Log EVERY inquiry — reporter name, outlet, deadline, question"
    rule: "NEVER say 'no comment' — say 'we'll get back to you by [time]'"
    deadline_rule: "Always ask their deadline. If none stated, assume 4 hours"

  step_2_assess:
    action: "Route to Communications Lead immediately"
    questions:
      - "What do they already know? (Often more than you think)"
      - "Who else are they talking to?"
      - "What's the story angle?"
      - "Is this hostile or informational?"

  step_3_respond:
    options:
      written_statement: "Default for most situations — controlled, reviewable"
      background_briefing: "Off-record to shape narrative — ONLY with trusted reporters"
      on_record_interview: "CEO/spokesperson — only when story is significant and you want to lead"
      no_response: "ONLY if legal counsel advises (active litigation, regulatory investigation)"

  step_4_track:
    action: "Monitor resulting coverage within 2 hours of publication"
    follow_up: "Correct factual errors immediately with evidence"

### Media Spokesperson Rules

Three key messages maximum — prepare them before ANY interaction
Bridge technique: "What I can tell you is..." / "The important thing here is..." / "Let me give you the full picture..."
Never speculate — "I don't want to speculate, but here's what we know..."
Never go off-record unless you'd be fine seeing it in print anyway
Repeat your key message at least 3 times — journalists use quotes, make sure the right ones are available
Assume everything is recorded — always
Don't fill silence — answer the question and stop talking

### Social Media Crisis Response

social_response_tiers:
  tier_1_viral_negative:
    threshold: ">1000 engagements or trending"
    response: "Official statement post + pin. CEO/founder post if SEV-1."
    timing: "Within 2 hours"
    tone: "Direct, human, accountable"

  tier_2_angry_customer_public:
    threshold: ">100 engagements, verified customer"
    response: "Public acknowledgment + DM to resolve"
    timing: "Within 1 hour"
    tone: "Empathetic, solution-oriented"

  tier_3_misinformation:
    threshold: "Factually wrong claims gaining traction"
    response: "Factual correction with evidence (screenshot, data, link)"
    timing: "Within 4 hours"
    tone: "Calm, factual, non-combative"

  tier_4_troll_attack:
    threshold: "Bad-faith actors, not real customers"
    response: "Ignore unless it's gaining credible traction"
    timing: "Monitor only"
    tone: "Do not engage"

### Regulatory Notification Requirements

Data Breach Notification Timelines (key jurisdictions):

JurisdictionDeadlineWho to NotifyThresholdGDPR (EU/UK)72 hoursSupervisory authority + affected individuals if high riskAny personal data breachUS — State laws30-90 days (varies by state)State AG + affected individualsPII of state residentsUS — HIPAA60 daysHHS + individuals; media if >500Protected health informationUS — SEC (public co)4 business days (Form 8-K)SEC + shareholdersMaterial cybersecurity incidentUS — NYDFS72 hoursNYDFSCybersecurity events for covered entitiesUS — FTCASAP (no fixed timeline)FTC if >500 peopleHealth breach notificationCanada (PIPEDA)ASAPPrivacy Commissioner + affected individualsReal risk of significant harmAustralia (NDB)30 daysOAIC + affected individualsEligible data breach

Critical rule: When in doubt, notify early. Late notification = separate violation with its own penalties.

### Document Preservation

legal_hold:
  trigger: "Any SEV-1 or SEV-2 crisis, any litigation threat, any regulatory inquiry"
  scope:
    - All emails, messages, documents related to the incident
    - System logs, access logs, audit trails
    - Employee communications (Slack, Teams, email)
    - Security camera footage if relevant
    - Phone records if relevant
  actions:
    - Issue written preservation notice to all custodians
    - Disable auto-delete on relevant systems
    - Preserve backup tapes/snapshots
    - Document chain of custody
  warning: "Spoliation of evidence = separate legal liability. NEVER delete anything after a crisis."

### Insurance Activation

□ Review cyber liability / D&O / general liability policies within 24 hours
□ Notify insurer per policy terms (often 24-72 hour requirement)
□ Document ALL costs from incident start (forensics, legal, PR, remediation, business interruption)
□ Confirm coverage for: incident response, forensics, notification costs, credit monitoring, legal defense, regulatory fines, business interruption
□ Engage panel counsel if policy requires it (using non-panel counsel may void coverage)

### Employee Communication Template

Subject: Important Update — [Brief Description]

Team,

I'm writing to share an important update about [situation — be specific].

What happened: [Facts only, no speculation]

What this means for you:
- [Direct impact on their work, if any]
- [Changes to operations, if any]
- [What they should/shouldn't do]

What we're doing:
- [Actions being taken]
- [Timeline for resolution]

What we need from you:
- Do NOT discuss this on social media or with external parties
- Direct all press/media inquiries to [Communications Lead name + contact]
- If you have relevant information, contact [designated person]
- Questions? [Internal FAQ link] or reach out to [manager / HR / designated person]

We'll share the next update by [specific time].

[Incident Commander / CEO name]

### War Room Operating Rhythm

war_room_cadence:
  sev_1:
    standup_frequency: "Every 2 hours"
    duration: "15 minutes max"
    format:
      - "What changed since last standup?"
      - "What actions are in progress?"
      - "What decisions are needed?"
      - "What's the next external communication?"
    after_hours: "On-call rotation, wake for material developments"

  sev_2:
    standup_frequency: "Every 4 hours during business hours"
    duration: "15 minutes"
    format: "Same as SEV-1"
    after_hours: "Async updates via war room channel"

  sev_3:
    standup_frequency: "Daily"
    duration: "15 minutes"
    format: "Status + decisions needed"

  documentation:
    timeline: "Updated in real-time — every action, decision, communication logged with timestamp"
    decisions_log: "Who decided what, when, with what information"
    communications_log: "Every external statement, who approved, when sent, to whom"

### 30-Day Recovery Plan

recovery_plan:
  week_1_stabilize:
    - Complete root cause analysis
    - Implement immediate fixes
    - Final comprehensive public statement
    - Individual outreach to top 20 accounts/stakeholders
    - Employee town hall — transparent Q&A
    - Begin insurance claim documentation

  week_2_rebuild:
    - Publish post-mortem (appropriate level of detail for audience)
    - Announce systemic changes being implemented
    - Customer retention campaign (credits, extended terms, enhanced SLAs)
    - Begin monitoring sentiment recovery
    - Media relationships: offer exclusive on "what we learned"

  week_3_reinforce:
    - Ship first preventive measures
    - Third-party audit/certification (if trust-related crisis)
    - Positive story pitching to media (new features, customer wins, hiring)
    - Employee morale initiatives
    - Partner/vendor relationship repair meetings

  week_4_measure:
    - Customer retention rate vs. pre-crisis baseline
    - NPS/CSAT delta
    - Media sentiment analysis
    - Employee engagement pulse
    - Social media sentiment trend
    - Revenue impact quantification
    - Insurance recovery status
    - Lessons learned document finalized

### Post-Mortem Template

crisis_post_mortem:
  incident_id: "[ID]"
  date: "[YYYY-MM-DD]"
  severity: "[SEV-1/2/3/4]"
  type: "[crisis type]"
  duration: "[detection to resolution]"

  timeline:
    - timestamp: "[YYYY-MM-DD HH:MM]"
      event: "[what happened]"
      action: "[what we did]"
      decision_by: "[who]"

  root_cause:
    immediate: "[what directly caused the crisis]"
    contributing: "[underlying factors]"
    systemic: "[organizational/process gaps]"

  impact:
    customers_affected: "[number]"
    revenue_impact: "[estimated $ loss]"
    reputation_impact: "[media coverage, social sentiment delta]"
    legal_exposure: "[pending/actual]"
    employee_impact: "[morale, attrition]"

  response_evaluation:
    detection_time: "[how long to detect]"
    response_time: "[how long to first action]"
    communication_time: "[how long to first external statement]"
    resolution_time: "[how long to contain + resolve]"
    what_worked: "[list]"
    what_didnt: "[list]"
    gaps_identified: "[list]"

  preventive_actions:
    - action: "[specific change]"
      owner: "[name]"
      deadline: "[date]"
      status: "[not started | in progress | complete]"

  lessons_learned:
    - "[key insight 1]"
    - "[key insight 2]"
    - "[key insight 3]"

### Annual Crisis Readiness Audit

Score your organization 1-5 on each dimension:

Dimension1 (Unprepared)3 (Basic)5 (Battle-Ready)CRT definedNo team identifiedNames listed but untrainedTeam trained, roles clear, contact tree testedStatement templatesNoneGeneric template existsTemplates for 8+ scenario types, pre-approved by legalMedia trainingNo trainingCEO did one sessionCEO + 2 spokespersons trained annually, mock interviewsMonitoringManual/ad-hocGoogle Alerts onlyReal-time social listening + customer signal dashboardsPlaybooksNoneOne generic playbookScenario-specific playbooks for top 5 risksTabletop exercisesNever doneDid one years agoQuarterly exercises rotating scenariosRegulatory knowledge"Legal handles it"Know major requirementsNotification matrix by jurisdiction, pre-drafted filingsInsurance"We have insurance"Know policy existsAnnual review, know coverage limits, panel counsel listedEmployee trainingNothingOnboarding mentionAnnual training: media policy, social media, who to escalate toCommunication infrastructureEmail onlySlack/Teams + emailRedundant channels + offline contacts + dark website ready

Scoring: 10-20 = Critical gaps. 21-35 = Developing. 36-45 = Good. 46-50 = Excellent.

### Scenario Planning: Top 10 Crises to Prepare For

Build playbooks for each:

Data breach — customer PII exposed
Product failure — critical bug affecting customers
Employee misconduct — harassment, fraud, discrimination
Executive departure — sudden, unexpected loss of key leader
Financial distress — cash crunch, missed payroll, covenant breach
Regulatory action — investigation, fine, compliance order
Social media firestorm — viral negative content
Litigation — class action, IP dispute, customer lawsuit
Vendor/partner failure — critical dependency goes down
Natural disaster / pandemic — operational continuity threat

### Tabletop Exercise Template

tabletop_exercise:
  scenario: "[Brief crisis description — 2-3 paragraphs with escalating details]"
  duration: "90 minutes"

  structure:
    phase_1_detection: # 15 min
      inject: "[How the crisis is first discovered]"
      questions:
        - "Who do you call first?"
        - "What's the severity level?"
        - "What information do you need before acting?"

    phase_2_escalation: # 20 min
      inject: "[New information that makes it worse — media call, second incident, larger scope]"
      questions:
        - "How does this change your response?"
        - "What's your first external communication?"
        - "What are the legal implications?"

    phase_3_public: # 20 min
      inject: "[It's now public — social media, press article, regulatory inquiry]"
      questions:
        - "Walk through your public statement"
        - "How do you handle the media inquiry?"
        - "What are you telling employees?"

    phase_4_recovery: # 15 min
      inject: "[Crisis is contained but damage is done]"
      questions:
        - "What's your 30-day recovery plan?"
        - "How do you prevent recurrence?"
        - "What would you do differently?"

    debrief: # 20 min
      - "What gaps did we find?"
      - "What worked well?"
      - "Action items with owners and deadlines"

### SaaS / Technology

Outage crisis: Status page protocol, customer communication cadence (every 30 min during active outage), SLA credit calculation, RCA publication within 5 business days
Data breach: See Phase 5 notification requirements + consider SOC 2 implications, vendor notification chain
AI/algorithm failure: Transparency about what went wrong, human oversight messaging, bias audit if applicable

### Healthcare

Patient data (HIPAA): 60-day notification to HHS, individual notice, media notice if >500 in a state
Clinical errors: Work with malpractice counsel first, peer review privilege considerations
Drug/device recall: FDA reporting requirements, healthcare provider notification

### Financial Services

Trading errors: Regulatory reporting (SEC/FINRA), customer notification, error trade policies
Fraud/AML: SAR filing (no customer notification for SARs), law enforcement coordination
System outage: Reg SCI notification, customer access restoration priority

### Legal

Client data breach: State bar notification, malpractice carrier notification, client notification with privilege considerations
Attorney misconduct: State bar self-reporting requirements, firm liability assessment
Conflict of interest: Ethical wall implementation, client consent or withdrawal

### Construction / Manufacturing

Workplace accident: OSHA reporting (8 hours for fatality, 24 hours for hospitalization), workers' comp, family notification protocol
Product recall: CPSC reporting, supply chain notification, customer remedy program
Environmental incident: EPA/state agency reporting, remediation plan, community notification

### Rate your crisis response: 0-100

DimensionWeight0-25 (Poor)50 (Adequate)75-100 (Excellent)Speed20%>24h to first statement4-8h<2h, proactiveAccuracy20%Errors corrected later, credibility damagedMostly accurate, minor gaps100% factual, verified before releaseTransparency15%Minimized, deflected, or hid informationShared basicsProactively shared bad news, admitted unknownsEmpathy15%Legalistic, cold, focused on companyAcknowledged impactGenuine concern, specific actions for affectedConsistency10%Contradictory messages across channelsMostly consistentSingle source of truth, all channels alignedFollow-through10%Went silent after first statementSome updatesCommitted to schedule, delivered every updateRecovery10%No systemic changes, could happen againSome fixesRoot cause addressed, preventive measures shipped

Scoring: 0-40 = Crisis mismanaged (likely secondary crisis). 41-60 = Survived but damaged. 61-80 = Handled well. 81-100 = Textbook response, may emerge stronger.

### Multi-Crisis (Two Crises at Once)

Assign separate Incident Commanders — never have one person running two crises
Check for connection between crises (often they're related)
Prioritize by impact to affected people, not to the company
Consolidate communications if crises are related

### Crisis During Major Event (Product Launch, Fundraise, IPO)

Default: pause the event. Don't launch into a crisis
Exception: if the crisis is unrelated and minor (SEV-4), proceed with heightened monitoring
Fundraise/IPO: immediate counsel with securities lawyers — disclosure obligations

### Hostile Takeover / Activist Investor

Board-level response only — not operational team
Engage specialized IR counsel and PR firm immediately
Employee messaging: "Business as usual, leadership is handling"
Do NOT engage on social media

### Whistleblower Situations

Legal privilege: route through counsel immediately
No retaliation — document this explicitly
Assess if self-reporting is advantageous (often reduces penalties)
Separate investigation from business response

### International / Multi-Jurisdiction

Identify all jurisdictions where affected people reside
Notification requirements differ by jurisdiction — map them ALL
Translate communications for affected populations
Consider cultural differences in crisis communication expectations
Time zone coordination for global response team

### Social Media Employee Crisis

Employee posts something damaging/offensive
Step 1: Is this a personal view or did they represent the company?
Step 2: Document everything (screenshots) before any action
Step 3: HR/legal review — termination decisions are permanent, don't rush
Step 4: If public response needed, separate individual from company
Step 5: Do NOT pile on publicly — handle privately, make one clear public statement

### Natural Language Commands

CommandWhat It Does"Crisis assessment for [situation]"Run /crisis-check framework — severity, type, blast radius, recommendation"Draft a crisis statement about [event]"Generate CARE-framework statement with appropriate template"Build a crisis response plan for [type]"Full CRT activation + communication plan + timeline"Media talking points for [situation]"3 key messages + bridge phrases + Q&A preparation"Employee communication about [crisis]"Internal messaging template with appropriate detail level"Post-mortem for [incident]"Structured post-mortem with timeline, root cause, preventive actions"Crisis readiness audit"Score organization across 10 preparedness dimensions"Run a tabletop exercise for [scenario]"Generate full 90-min tabletop exercise with injects and questions"Regulatory notification checklist for [type] in [jurisdiction]"Notification requirements, deadlines, and filing steps"Recovery plan after [crisis]"30-day recovery roadmap with stakeholder-specific actions"Rate our crisis response to [incident]"Score across 7 dimensions with specific improvement recommendations"What are our top crisis risks?"Scenario planning for your industry with playbook gaps identified
## Trust
- Source: tencent
- Verification: Indexed source record
- Publisher: 1kalin
- Version: 1.0.0
## Source health
- Status: healthy
- Source download looks usable.
- Yavira can redirect you to the upstream package for this source.
- Health scope: source
- Reason: direct_download_ok
- Checked at: 2026-04-23T16:43:11.935Z
- Expires at: 2026-04-30T16:43:11.935Z
- Recommended action: Download for OpenClaw
## Links
- [Detail page](https://openagent3.xyz/skills/afrexai-crisis-management)
- [Send to Agent page](https://openagent3.xyz/skills/afrexai-crisis-management/agent)
- [JSON manifest](https://openagent3.xyz/skills/afrexai-crisis-management/agent.json)
- [Markdown brief](https://openagent3.xyz/skills/afrexai-crisis-management/agent.md)
- [Download page](https://openagent3.xyz/downloads/afrexai-crisis-management)