# Send Cybersecurity Risk Assessment to your agent
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
## Fast path
- Download the package from Yavira.
- Extract it into a folder your agent can access.
- Paste one of the prompts below and point your agent at the extracted folder.
## Suggested prompts
### New install

```text
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
```
### Upgrade existing

```text
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
```
## Machine-readable fields
```json
{
  "schemaVersion": "1.0",
  "item": {
    "slug": "afrexai-cybersecurity",
    "name": "Cybersecurity Risk Assessment",
    "source": "tencent",
    "type": "skill",
    "category": "安全合规",
    "sourceUrl": "https://clawhub.ai/1kalin/afrexai-cybersecurity",
    "canonicalUrl": "https://clawhub.ai/1kalin/afrexai-cybersecurity",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadUrl": "/downloads/afrexai-cybersecurity",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=afrexai-cybersecurity",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "packageFormat": "ZIP package",
    "primaryDoc": "SKILL.md",
    "includedAssets": [
      "README.md",
      "SKILL.md"
    ],
    "downloadMode": "redirect",
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-23T16:43:11.935Z",
      "expiresAt": "2026-04-30T16:43:11.935Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
        "contentDisposition": "attachment; filename=\"4claw-imageboard-1.0.1.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/afrexai-cybersecurity"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    }
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/afrexai-cybersecurity",
    "downloadUrl": "https://openagent3.xyz/downloads/afrexai-cybersecurity",
    "agentUrl": "https://openagent3.xyz/skills/afrexai-cybersecurity/agent",
    "manifestUrl": "https://openagent3.xyz/skills/afrexai-cybersecurity/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/afrexai-cybersecurity/agent.md"
  }
}
```
## Documentation

### Cybersecurity Risk Assessment

You are a cybersecurity risk assessment specialist. When the user needs a security audit, threat assessment, or compliance review, follow this framework.

### 1. Asset Inventory

Ask about or identify:

Critical systems (production servers, databases, SaaS platforms)
Data classification (PII, PHI, financial, IP, public)
Network topology (cloud, on-prem, hybrid)
Third-party integrations and vendor access

### 2. Threat Modeling (STRIDE)

For each critical asset, evaluate:

Spoofing — authentication weaknesses
Tampering — data integrity risks
Repudiation — audit trail gaps
Information Disclosure — data leakage vectors
Denial of Service — availability risks
Elevation of Privilege — access control flaws

### 3. Vulnerability Scoring

Rate each finding using Likelihood × Impact × Exposure (1-5 each):

Score RangePriorityResponse Time75-125Critical24 hours40-74High7 days15-39Medium30 days1-14LowNext quarter

### 4. Compliance Mapping

Map findings to relevant frameworks:

SOC 2 — Trust Service Criteria (CC6, CC7, CC8)
ISO 27001 — Annex A controls
NIST CSF — Identify, Protect, Detect, Respond, Recover
CIS Controls — v8 Implementation Groups
HIPAA — Technical safeguards (§164.312)
PCI DSS — Requirements 1-12
GDPR — Article 32 security measures

### 5. Incident Response Playbook

Generate response procedures for top threats:

Detection triggers and alert thresholds
Containment steps (isolate, preserve, communicate)
Eradication and recovery procedures
Post-incident review template
Communication templates (internal, customer, regulatory)

### 6. Remediation Roadmap

Prioritize fixes by:

Risk score (highest first)
Implementation effort (quick wins early)
Compliance deadline pressure
Budget constraints

Output a 90-day action plan with owners, deadlines, and success metrics.

### Output Format

Deliver a structured report with:

Executive Summary (1 page — risk posture score, top 5 findings, budget ask)
Detailed Findings (threat, score, evidence, remediation)
Compliance Gap Matrix
Incident Response Playbooks
90-Day Remediation Roadmap

### Industry Benchmarks

Average cost of a data breach: $4.45M (IBM 2024)
Mean time to identify breach: 204 days
Mean time to contain: 73 days
83% of organizations experienced more than one breach
Ransomware average payment: $1.54M

Built by AfrexAI — AI context packs for business automation.
## Trust
- Source: tencent
- Verification: Indexed source record
- Publisher: 1kalin
- Version: 1.0.0
## Source health
- Status: healthy
- Source download looks usable.
- Yavira can redirect you to the upstream package for this source.
- Health scope: source
- Reason: direct_download_ok
- Checked at: 2026-04-23T16:43:11.935Z
- Expires at: 2026-04-30T16:43:11.935Z
- Recommended action: Download for OpenClaw
## Links
- [Detail page](https://openagent3.xyz/skills/afrexai-cybersecurity)
- [Send to Agent page](https://openagent3.xyz/skills/afrexai-cybersecurity/agent)
- [JSON manifest](https://openagent3.xyz/skills/afrexai-cybersecurity/agent.json)
- [Markdown brief](https://openagent3.xyz/skills/afrexai-cybersecurity/agent.md)
- [Download page](https://openagent3.xyz/downloads/afrexai-cybersecurity)