Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Complete cybersecurity assessment, threat modeling, and hardening system. Use when conducting security audits, threat modeling, penetration testing, incident...
Complete cybersecurity assessment, threat modeling, and hardening system. Use when conducting security audits, threat modeling, penetration testing, incident...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
Complete methodology for security assessment, threat modeling, vulnerability management, incident response, and security program design. No tools required โ pure agent knowledge that works with any codebase, infrastructure, or organization.
Run through these three tiers: Tier 1 โ Critical (fix today): Default credentials in production Secrets in source code or environment files committed to git No authentication on admin endpoints SQL injection in user-facing forms Unencrypted sensitive data at rest Public S3 buckets or cloud storage No HTTPS enforcement Root/admin running application processes Tier 2 โ High (fix this week): Dependencies with known CVEs (CVSS โฅ 7.0) No rate limiting on authentication endpoints Missing CSRF protection on state-changing operations Verbose error messages leaking stack traces No input validation on API endpoints Weak password policy (< 12 chars, no complexity) Session tokens in URL parameters No logging of authentication events Tier 3 โ Medium (fix this sprint): Missing security headers (CSP, HSTS, X-Frame-Options) No automated dependency scanning in CI Overprivileged service accounts No secret rotation policy Missing account lockout after failed attempts No security.txt or responsible disclosure policy Cookies without Secure/HttpOnly/SameSite flags Score: Count failures. 0-2 = solid. 3-5 = needs work. 6+ = stop shipping features, fix security.
assessment: name: "[Project/Org Name] Security Assessment" date: "YYYY-MM-DD" assessor: "[Agent/Person]" scope: applications: - name: "[App Name]" type: "web|api|mobile|desktop|iot" tech_stack: "[languages, frameworks, DBs]" hosting: "cloud|on-prem|hybrid" cloud_provider: "aws|gcp|azure|other" internet_facing: true|false handles_pii: true|false handles_payments: true|false handles_phi: true|false # health data infrastructure: - servers: "[count, OS types]" containers: true|false orchestration: "k8s|ecs|nomad|none" cdn: "[provider or none]" dns: "[provider]" third_parties: - name: "[service]" data_shared: "[what data]" criticality: "high|medium|low" compliance_requirements: - "SOC 2|ISO 27001|GDPR|HIPAA|PCI DSS|SOX|none" previous_incidents: - date: "YYYY-MM-DD" type: "[breach|vuln|misconfiguration]" severity: "critical|high|medium|low" resolution: "[what was done]" risk_tolerance: "conservative|moderate|aggressive"
For each application, draw the data flow: [User] โ [CDN/WAF] โ [Load Balancer] โ [Web Server] โ [App Server] โ [Database] โ [Cache] โ [Message Queue] โ [Worker] โ [Third-party API] โ [Object Storage] Identify trust boundaries โ where privilege level changes: Internet โ DMZ (public-facing services) DMZ โ Internal network (app servers, DBs) App โ Database (credential boundary) User โ Admin (role boundary) Service โ Service (API key boundary) Your infra โ Third-party (trust boundary)
For EACH component crossing a trust boundary: ThreatQuestionExample AttackSpoofingCan an attacker pretend to be someone else?Stolen JWT, session hijacking, credential stuffingTamperingCan data be modified in transit or at rest?Man-in-the-middle, SQL injection, parameter manipulationRepudiationCan someone deny they did something?Missing audit logs, unsigned transactionsInformation DisclosureCan sensitive data leak?Error messages, API over-fetching, side channelsDenial of ServiceCan the service be overwhelmed?DDoS, resource exhaustion, regex DoSElevation of PrivilegeCan someone gain unauthorized access?IDOR, broken access control, privilege escalation
threats: - id: "T-001" component: "[affected component]" category: "S|T|R|I|D|E" description: "[specific attack scenario]" attacker_profile: "external-unauthenticated|external-authenticated|internal|insider" likelihood: 1-5 # 1=rare, 5=almost certain impact: 1-5 # 1=negligible, 5=catastrophic risk_score: 0 # likelihood ร impact existing_controls: "[what's already in place]" residual_risk: "accept|mitigate|transfer|avoid" mitigation: "[specific fix]" priority: "P0|P1|P2|P3" owner: "[person/team]" status: "open|in-progress|mitigated|accepted"
P0 (risk โฅ 20): Fix immediately, stop other work P1 (risk 12-19): Fix within 1 week P2 (risk 6-11): Fix within 1 sprint P3 (risk โค 5): Track, fix when convenient
Decision tree: Need to store passwords? โ bcrypt (cost 12+) or Argon2id โ NEVER: MD5, SHA1, SHA256 without salt Need to encrypt data at rest? โ AES-256-GCM (authenticated encryption) โ NEVER: ECB mode, DES, RC4 Need to encrypt in transit? โ TLS 1.2+ (prefer 1.3) โ HSTS with includeSubDomains โ Certificate pinning for mobile apps Need to generate random values? โ crypto.randomBytes() / secrets.token_bytes() โ NEVER: Math.random(), random.random() Need to sign/verify? โ HMAC-SHA256 for symmetric โ Ed25519 or RSA-PSS (2048+ bits) for asymmetric โ NEVER: RSA PKCS#1 v1.5 for new systems
Secure design checklist: Business logic abuse scenarios documented Rate limiting on expensive operations Fail-safe defaults (deny by default) Separation of duties for critical operations Multi-step transactions use CSRF tokens API pagination has max limit File uploads have size limits AND type validation (magic bytes, not extension) Background job payloads are signed/validated
Server hardening checklist: web_server: - remove_default_pages: true - disable_directory_listing: true - remove_server_version_header: true - disable_TRACE_method: true - custom_error_pages: true # no stack traces application: - debug_mode: false # NEVER in production - verbose_errors: false - default_accounts_removed: true - unnecessary_features_disabled: true - admin_panel_ip_restricted: true cloud: - public_buckets: none - security_groups_least_privilege: true - imds_v2_enforced: true # AWS - logging_enabled: true - mfa_on_root: true - billing_alerts: true
VulnTestFixA06: Vulnerable Componentsnpm audit, pip-audit, trivy fs .Update, pin versions, automate scanning in CIA07: Auth FailuresBrute force test, password policy audit, MFA coverageRate limit + lockout, enforce MFA, bcrypt/Argon2A08: Data IntegrityCan unsigned data modify app behavior?Sign all serialized data, verify checksums, SRI for CDNA09: Logging GapsDo you log auth events, access changes, failures?Structured logging, SIEM integration, alert on anomaliesA10: SSRFCan user input trigger server-side requests?Allowlist URLs, block internal IPs, no redirects to internal
network_hardening: firewall: default_policy: "deny-all" allowed_inbound: - port: 443 source: "0.0.0.0/0" service: "HTTPS" - port: 22 source: "[admin_ip_range]" service: "SSH" rules: - "No direct database access from internet" - "Internal services communicate on private subnet" - "Egress filtering โ block unnecessary outbound" ssh: password_auth: false root_login: false key_type: "ed25519" port: "[non-standard recommended]" fail2ban: true max_auth_tries: 3 dns: dnssec: true caa_records: true # restrict who can issue TLS certs no_zone_transfer: true tls: min_version: "1.2" preferred: "1.3" cipher_suites: "ECDHE+AESGCM:ECDHE+CHACHA20" hsts: "max-age=31536000; includeSubDomains; preload" certificate_monitoring: true auto_renewal: true
container_hardening: image: - base: "distroless or alpine (minimal)" - user: "non-root (USER 1000:1000)" - scan: "trivy image before push" - sign: "cosign or Notary" - pins: "use SHA256 digests, not :latest" - secrets: "NEVER in Dockerfile or image layers" - layers: "multi-stage builds, minimal final image" runtime: - read_only_rootfs: true - no_new_privileges: true - drop_all_capabilities: true - add_only: ["NET_BIND_SERVICE"] # if needed - resource_limits: true - seccomp_profile: "default" - network_policy: "deny by default" registry: - private: true - vulnerability_scanning: true - image_signing: true - tag_immutability: true
cloud_security_baseline: identity: - root_account_mfa: true - no_root_access_keys: true - least_privilege_iam: true - service_accounts_scoped: true - temporary_credentials: true # assume role, not long-lived keys - sso_enforced: true data: - encryption_at_rest: "default on all storage" - encryption_in_transit: "TLS everywhere" - backup_encryption: true - key_management: "cloud KMS, not self-managed" - data_classification: true network: - vpc_flow_logs: true - private_subnets_for_databases: true - nat_gateway_for_outbound: true - waf_on_public_endpoints: true - ddos_protection: true monitoring: - cloudtrail_enabled: true # or equivalent - config_rules: true - guardduty_enabled: true # or equivalent - cost_alerts: true - unused_resource_alerts: true storage: - no_public_buckets: true - versioning_on_critical: true - lifecycle_policies: true - access_logging: true
Discovery โ Triage โ Prioritize โ Remediate โ Verify โ Close โ โ โ โ โ Scan/ Confirm CVSS + Fix or Retest Report real? context compensate
SeverityCVSSRemediation SLAEscalationCritical9.0-10.024 hoursCTO/CISO immediatelyHigh7.0-8.97 daysTeam lead + securityMedium4.0-6.930 daysSprint backlogLow0.1-3.990 daysTrack, fix when convenientInfo0No SLADocument for awareness
vulnerability: id: "VULN-YYYY-NNN" title: "[descriptive title]" discovered: "YYYY-MM-DD" discoverer: "[scanner/person/bounty]" severity: "critical|high|medium|low|info" cvss_score: 0.0 cvss_vector: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cve: "[if applicable]" affected: - component: "[app/service/library]" version: "[affected versions]" environment: "production|staging|dev" description: "[what the vulnerability is]" impact: "[what an attacker could do]" proof_of_concept: "[steps to reproduce]" remediation: fix: "[specific fix]" workaround: "[temporary mitigation]" compensating_control: "[if fix isn't immediate]" status: "open|in-progress|fixed|accepted|false-positive" fixed_date: "YYYY-MM-DD" verified_by: "[person who confirmed fix]"
Scan TypeFrequencyTool ExamplesDependency scanEvery CI buildnpm audit, pip-audit, trivySAST (code)Every PRSemgrep, CodeQL, BanditSecret scanningEvery commitGitLeaks, truffleHog, GitHub secret scanningContainer scanEvery image buildTrivy, Grype, Snyk ContainerDAST (runtime)WeeklyOWASP ZAP, Burp Suite, NucleiCloud configDailyScoutSuite, Prowler, CloudSploitPenetration testQuarterlyManual + automatedRed teamAnnuallyExternal firm
LevelDefinitionResponse TimeTeamSEV-1Active breach, data exfiltration, service down15 minAll hands + management + legalSEV-2Vulnerability actively exploited, partial compromise1 hourSecurity + affected team leadsSEV-3Suspicious activity, potential compromise indicators4 hoursSecurity teamSEV-4Low-risk finding, policy violation, failed attackNext business dayAssigned engineer
Internal notification (SEV-1/2): ๐จ SECURITY INCIDENT โ [severity] What: [brief description] Impact: [what's affected] Status: [containment/investigation/resolved] Incident Commander: [name] Channel: #incident-[id] Next update: [time] DO NOT discuss outside this channel. Customer notification (if required): Subject: Security Notice โ [Company Name] We're writing to inform you of a security incident that [may have|affected] your account. What happened: [brief, honest description] When: [date range] What data was involved: [specific data types] What we've done: [remediation steps] What you should do: [password reset, monitor accounts, etc.] Contact: [security team email/phone] We take the security of your data seriously and have [specific improvements].
# Copy-paste baseline for production: Strict-Transport-Security: max-age=31536000; includeSubDomains; preload Content-Security-Policy: default-src 'self'; script-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https:; font-src 'self'; connect-src 'self'; frame-ancestors 'none'; base-uri 'self'; form-action 'self' X-Content-Type-Options: nosniff X-Frame-Options: DENY Referrer-Policy: strict-origin-when-cross-origin Permissions-Policy: camera=(), microphone=(), geolocation=(), interest-cohort=() Cross-Origin-Opener-Policy: same-origin Cross-Origin-Resource-Policy: same-origin X-XSS-Protection: 0 # Disabled โ CSP handles this; old header can cause issues
Set-Cookie: session=<token>; Secure; # HTTPS only HttpOnly; # No JavaScript access SameSite=Lax; # CSRF protection (Strict if no cross-site navigation needed) Path=/; # Scope appropriately Max-Age=3600; # 1 hour (adjust per use case) Domain=.yourdomain.com; # Explicit domain
password_policy: minimum_length: 12 # NIST minimum is 8, 12+ recommended maximum_length: 128 # Must support long passwords complexity_rules: false # NIST says don't require special chars check_against_breached: true # HaveIBeenPwned API no_password_hints: true no_security_questions: true # Easy to social engineer allow_paste: true # For password managers rate_limit_attempts: "5 per 15 minutes" lockout_duration: "progressive (1min, 5min, 15min, 1hr)" mfa_required: "all accounts" mfa_methods: preferred: "TOTP or WebAuthn/passkeys" acceptable: "push notification" discouraged: "SMS (SIM swap risk)" storage: "Argon2id or bcrypt cost 12+"
jwt_security: signing: algorithm: "RS256 or EdDSA" # NEVER HS256 with shared secrets in distributed systems key_rotation: "quarterly" verify_algorithm: true # Reject alg=none claims: exp: "required โ 15 min for access, 7d for refresh" iss: "required โ validate on every request" aud: "required โ validate matches expected service" iat: "required" jti: "recommended โ for revocation" nbf: "recommended" storage: access_token: "memory only (never localStorage)" refresh_token: "httpOnly secure cookie" revocation: method: "token blacklist with Redis TTL matching exp" on_password_change: "revoke all tokens" on_permission_change: "revoke all tokens"
Use Authorization Code flow with PKCE (never Implicit) Validate state parameter to prevent CSRF Validate nonce for OIDC to prevent replay Validate token issuer and audience Store tokens server-side, not in browser Implement token rotation for refresh tokens Set minimal scopes (principle of least privilege) Register exact redirect URIs (no wildcards)
security_dashboard: vulnerability_management: - open_critical: 0 # Target: always 0 - open_high: 0 # Target: < 5 - mean_time_to_remediate: critical: "24h" # Target high: "7d" medium: "30d" - scan_coverage: "100%" # % of repos with automated scanning incident_management: - incidents_this_quarter: 0 - mean_time_to_detect: "< 1h" - mean_time_to_respond: "< 4h" - mean_time_to_recover: "< 24h" access_control: - mfa_adoption: "100%" - privileged_accounts: 0 # Count, minimize - stale_accounts: 0 # Accounts unused > 90 days - access_reviews_completed: "on schedule" code_security: - repos_with_sast: "100%" - repos_with_dependency_scanning: "100%" - secret_detection_coverage: "100%" - security_review_for_critical_changes: "100%" training: - security_awareness_completion: "100%" - phishing_simulation_click_rate: "< 5%" - security_champions_per_team: ">= 1"
PASSIVE (no direct interaction with target): 1. DNS enumeration: subdomains, MX, TXT, CNAME - Tools: subfinder, amass, crt.sh, dnsdumpster 2. Technology fingerprinting - Check: Wappalyzer, BuiltWith, HTTP headers 3. Public exposure - Shodan/Censys for open ports/services - GitHub/GitLab for leaked code/secrets - Wayback Machine for old endpoints 4. Employee OSINT (for social engineering scope) - LinkedIn for tech stack clues - Job postings reveal internal tools ACTIVE (interacting with target โ requires permission): 1. Port scanning: full TCP + top 1000 UDP 2. Service enumeration: version detection 3. Web crawling: sitemap, robots.txt, directory brute-force 4. API discovery: /api, /v1, /graphql, /swagger, /openapi
report: executive_summary: overall_risk: "critical|high|medium|low" critical_findings: 0 high_findings: 0 medium_findings: 0 low_findings: 0 key_recommendations: - "[top 3 fixes by impact]" scope: targets: "[URLs, IPs, apps tested]" methodology: "OWASP Testing Guide v4.2 + PTES" dates: "YYYY-MM-DD to YYYY-MM-DD" type: "black-box|grey-box|white-box" exclusions: "[what was out of scope]" findings: - id: "F-001" title: "[descriptive title]" severity: "critical|high|medium|low|info" cvss: 0.0 location: "[URL/endpoint/component]" description: "[what the vulnerability is]" impact: "[what an attacker could do]" evidence: "[screenshots, request/response pairs]" reproduction_steps: - "[step by step]" remediation: "[specific fix with code examples]" references: - "[OWASP, CWE, CVE links]" positive_observations: - "[security controls that were effective]"
supply_chain: dependencies: - lock_files: "always commit (package-lock.json, poetry.lock, go.sum)" - pin_versions: "exact versions, not ranges" - audit_frequency: "every CI build" - auto_update: "Dependabot/Renovate with auto-merge for patch, review for minor/major" - review_new_deps: check: "maintainer count, last update, download count, known issues" rule: "no single-maintainer deps for critical paths" - sbom: "generate SPDX or CycloneDX on every release" build_pipeline: - reproducible_builds: true - artifact_signing: true - build_provenance: true # SLSA Level 2+ - no_curl_pipe_bash: true # Never pipe internet scripts to shell - verify_checksums: true ci_cd: - pin_action_versions: "use SHA, not tags (actions/checkout@SHA)" - least_privilege_tokens: true - no_secrets_in_logs: true - protected_branches: true - required_reviews: true - signed_commits: "recommended"
Rate any application/system 0-100: DimensionWeight0 (Critical)5 (Adequate)10 (Excellent)Authentication & Access20%No auth or default credsPassword + basic RBACMFA + ABAC + zero trustData Protection15%Plaintext secrets, no encryptionEncryption at rest + transitE2E encryption, key rotation, classificationVulnerability Management15%No scanning, known CVEsAutomated scanning, SLAs metFull coverage, MTTD < 1h, bug bountyInfrastructure Security15%Open ports, no firewallHardened baseline, least privilegeZero trust, microsegmentation, IaCLogging & Monitoring10%No security loggingCentralized logs, basic alertsSIEM, anomaly detection, 24/7 SOCIncident Response10%No planDocumented plan, tested annuallyAutomated response, < 1h MTTRCode Security10%No reviews, injection vulnsSAST in CI, peer reviewFull pipeline, threat modeling, security championsSupply Chain5%No dependency managementLock files, automated scanningSBOM, signed artifacts, SLSA Score interpretation: 90-100: Excellent โ security is a competitive advantage 70-89: Good โ solid foundation, keep improving 50-69: Needs work โ significant gaps exist Below 50: Critical โ stop feature work, fix security
Security through obscurity โ hiding admin panel at /secret-admin is not security Client-side only validation โ always validate server-side Trusting internal networks โ assume breach, verify everything Logging sensitive data โ passwords, tokens, PII in logs = breach waiting to happen "We're too small to be targeted" โ automated attacks don't check company size One-time audit mentality โ security is continuous, not a checkbox Ignoring security in dev/staging โ attackers find your staging environment too Over-permissioning for convenience โ least privilege, always No backup testing โ backups you haven't tested are hopes, not backups Treating compliance as security โ SOC 2 โ secure; it's a starting point
Startup with zero security: Start with Phase 9 Quarter 1 โ foundation first Legacy application: Focus on network segmentation + WAF + monitoring before code fixes Microservices: Service mesh for mTLS, centralized auth (OAuth/OIDC), API gateway IoT/embedded: Assume physical access, encrypt firmware, signed updates, minimal attack surface Mobile apps: Certificate pinning, root/jailbreak detection, binary protection, secure local storage Serverless: Function-level IAM, no secrets in code, API Gateway throttling, cold start timing attacks Multi-tenant SaaS: Tenant isolation verification, noisy neighbor prevention, cross-tenant data leak testing
"Audit security of [project/repo]" โ Full assessment (Phase 1-4) "Threat model [system/feature]" โ STRIDE analysis (Phase 2) "Check OWASP top 10 for [app]" โ Application security review (Phase 3) "Harden [server/container/cloud]" โ Infrastructure checklist (Phase 4) "Create incident response plan" โ IR playbook (Phase 6) "Design security program" โ Phased program build (Phase 9) "Pentest methodology for [target]" โ Testing phases (Phase 10) "Score security of [system]" โ 100-point rubric (Phase 12) "Review auth implementation" โ Auth deep dive (Phase 8) "Check security headers" โ Header audit (Phase 7) "Vulnerability report for [finding]" โ Report template (Phase 5) "Supply chain security review" โ Dependency audit (Phase 11)
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.