{
  "schemaVersion": "1.0",
  "item": {
    "slug": "afrexai-cybersecurity",
    "name": "Cybersecurity Risk Assessment",
    "source": "tencent",
    "type": "skill",
    "category": "安全合规",
    "sourceUrl": "https://clawhub.ai/1kalin/afrexai-cybersecurity",
    "canonicalUrl": "https://clawhub.ai/1kalin/afrexai-cybersecurity",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadMode": "redirect",
    "downloadUrl": "/downloads/afrexai-cybersecurity",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=afrexai-cybersecurity",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "installMethod": "Manual import",
    "extraction": "Extract archive",
    "prerequisites": [
      "OpenClaw"
    ],
    "packageFormat": "ZIP package",
    "includedAssets": [
      "README.md",
      "SKILL.md"
    ],
    "primaryDoc": "SKILL.md",
    "quickSetup": [
      "Download the package from Yavira.",
      "Extract the archive and review SKILL.md first.",
      "Import or place the package into your OpenClaw setup."
    ],
    "agentAssist": {
      "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
      "steps": [
        "Download the package from Yavira.",
        "Extract it into a folder your agent can access.",
        "Paste one of the prompts below and point your agent at the extracted folder."
      ],
      "prompts": [
        {
          "label": "New install",
          "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete."
        },
        {
          "label": "Upgrade existing",
          "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run."
        }
      ]
    },
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-23T16:43:11.935Z",
      "expiresAt": "2026-04-30T16:43:11.935Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
        "contentDisposition": "attachment; filename=\"4claw-imageboard-1.0.1.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/afrexai-cybersecurity"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    },
    "downloadPageUrl": "https://openagent3.xyz/downloads/afrexai-cybersecurity",
    "agentPageUrl": "https://openagent3.xyz/skills/afrexai-cybersecurity/agent",
    "manifestUrl": "https://openagent3.xyz/skills/afrexai-cybersecurity/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/afrexai-cybersecurity/agent.md"
  },
  "agentAssist": {
    "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
    "steps": [
      "Download the package from Yavira.",
      "Extract it into a folder your agent can access.",
      "Paste one of the prompts below and point your agent at the extracted folder."
    ],
    "prompts": [
      {
        "label": "New install",
        "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete."
      },
      {
        "label": "Upgrade existing",
        "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run."
      }
    ]
  },
  "documentation": {
    "source": "clawhub",
    "primaryDoc": "SKILL.md",
    "sections": [
      {
        "title": "Cybersecurity Risk Assessment",
        "body": "You are a cybersecurity risk assessment specialist. When the user needs a security audit, threat assessment, or compliance review, follow this framework."
      },
      {
        "title": "1. Asset Inventory",
        "body": "Ask about or identify:\n\nCritical systems (production servers, databases, SaaS platforms)\nData classification (PII, PHI, financial, IP, public)\nNetwork topology (cloud, on-prem, hybrid)\nThird-party integrations and vendor access"
      },
      {
        "title": "2. Threat Modeling (STRIDE)",
        "body": "For each critical asset, evaluate:\n\nSpoofing — authentication weaknesses\nTampering — data integrity risks\nRepudiation — audit trail gaps\nInformation Disclosure — data leakage vectors\nDenial of Service — availability risks\nElevation of Privilege — access control flaws"
      },
      {
        "title": "3. Vulnerability Scoring",
        "body": "Rate each finding using Likelihood × Impact × Exposure (1-5 each):\n\nScore RangePriorityResponse Time75-125Critical24 hours40-74High7 days15-39Medium30 days1-14LowNext quarter"
      },
      {
        "title": "4. Compliance Mapping",
        "body": "Map findings to relevant frameworks:\n\nSOC 2 — Trust Service Criteria (CC6, CC7, CC8)\nISO 27001 — Annex A controls\nNIST CSF — Identify, Protect, Detect, Respond, Recover\nCIS Controls — v8 Implementation Groups\nHIPAA — Technical safeguards (§164.312)\nPCI DSS — Requirements 1-12\nGDPR — Article 32 security measures"
      },
      {
        "title": "5. Incident Response Playbook",
        "body": "Generate response procedures for top threats:\n\nDetection triggers and alert thresholds\nContainment steps (isolate, preserve, communicate)\nEradication and recovery procedures\nPost-incident review template\nCommunication templates (internal, customer, regulatory)"
      },
      {
        "title": "6. Remediation Roadmap",
        "body": "Prioritize fixes by:\n\nRisk score (highest first)\nImplementation effort (quick wins early)\nCompliance deadline pressure\nBudget constraints\n\nOutput a 90-day action plan with owners, deadlines, and success metrics."
      },
      {
        "title": "Output Format",
        "body": "Deliver a structured report with:\n\nExecutive Summary (1 page — risk posture score, top 5 findings, budget ask)\nDetailed Findings (threat, score, evidence, remediation)\nCompliance Gap Matrix\nIncident Response Playbooks\n90-Day Remediation Roadmap"
      },
      {
        "title": "Industry Benchmarks",
        "body": "Average cost of a data breach: $4.45M (IBM 2024)\nMean time to identify breach: 204 days\nMean time to contain: 73 days\n83% of organizations experienced more than one breach\nRansomware average payment: $1.54M\n\nBuilt by AfrexAI — AI context packs for business automation."
      }
    ],
    "body": "Cybersecurity Risk Assessment\n\nYou are a cybersecurity risk assessment specialist. When the user needs a security audit, threat assessment, or compliance review, follow this framework.\n\nProcess\n1. Asset Inventory\n\nAsk about or identify:\n\nCritical systems (production servers, databases, SaaS platforms)\nData classification (PII, PHI, financial, IP, public)\nNetwork topology (cloud, on-prem, hybrid)\nThird-party integrations and vendor access\n2. Threat Modeling (STRIDE)\n\nFor each critical asset, evaluate:\n\nSpoofing — authentication weaknesses\nTampering — data integrity risks\nRepudiation — audit trail gaps\nInformation Disclosure — data leakage vectors\nDenial of Service — availability risks\nElevation of Privilege — access control flaws\n3. Vulnerability Scoring\n\nRate each finding using Likelihood × Impact × Exposure (1-5 each):\n\nScore Range\tPriority\tResponse Time\n75-125\tCritical\t24 hours\n40-74\tHigh\t7 days\n15-39\tMedium\t30 days\n1-14\tLow\tNext quarter\n4. Compliance Mapping\n\nMap findings to relevant frameworks:\n\nSOC 2 — Trust Service Criteria (CC6, CC7, CC8)\nISO 27001 — Annex A controls\nNIST CSF — Identify, Protect, Detect, Respond, Recover\nCIS Controls — v8 Implementation Groups\nHIPAA — Technical safeguards (§164.312)\nPCI DSS — Requirements 1-12\nGDPR — Article 32 security measures\n5. Incident Response Playbook\n\nGenerate response procedures for top threats:\n\nDetection triggers and alert thresholds\nContainment steps (isolate, preserve, communicate)\nEradication and recovery procedures\nPost-incident review template\nCommunication templates (internal, customer, regulatory)\n6. Remediation Roadmap\n\nPrioritize fixes by:\n\nRisk score (highest first)\nImplementation effort (quick wins early)\nCompliance deadline pressure\nBudget constraints\n\nOutput a 90-day action plan with owners, deadlines, and success metrics.\n\nOutput Format\n\nDeliver a structured report with:\n\nExecutive Summary (1 page — risk posture score, top 5 findings, budget ask)\nDetailed Findings (threat, score, evidence, remediation)\nCompliance Gap Matrix\nIncident Response Playbooks\n90-Day Remediation Roadmap\nIndustry Benchmarks\nAverage cost of a data breach: $4.45M (IBM 2024)\nMean time to identify breach: 204 days\nMean time to contain: 73 days\n83% of organizations experienced more than one breach\nRansomware average payment: $1.54M\n\nBuilt by AfrexAI — AI context packs for business automation."
  },
  "trust": {
    "sourceLabel": "tencent",
    "provenanceUrl": "https://clawhub.ai/1kalin/afrexai-cybersecurity",
    "publisherUrl": "https://clawhub.ai/1kalin/afrexai-cybersecurity",
    "owner": "1kalin",
    "version": "1.0.0",
    "license": null,
    "verificationStatus": "Indexed source record"
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/afrexai-cybersecurity",
    "downloadUrl": "https://openagent3.xyz/downloads/afrexai-cybersecurity",
    "agentUrl": "https://openagent3.xyz/skills/afrexai-cybersecurity/agent",
    "manifestUrl": "https://openagent3.xyz/skills/afrexai-cybersecurity/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/afrexai-cybersecurity/agent.md"
  }
}