{
  "schemaVersion": "1.0",
  "item": {
    "slug": "gov-cybersecurity",
    "name": "Government Cybersecurity Vulnerability Intel",
    "source": "tencent",
    "type": "skill",
    "category": "数据分析",
    "sourceUrl": "https://clawhub.ai/martc03/gov-cybersecurity",
    "canonicalUrl": "https://clawhub.ai/martc03/gov-cybersecurity",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadMode": "redirect",
    "downloadUrl": "/downloads/gov-cybersecurity",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=gov-cybersecurity",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "installMethod": "Manual import",
    "extraction": "Extract archive",
    "prerequisites": [
      "OpenClaw"
    ],
    "packageFormat": "ZIP package",
    "includedAssets": [
      "SKILL.md"
    ],
    "primaryDoc": "SKILL.md",
    "quickSetup": [
      "Download the package from Yavira.",
      "Extract the archive and review SKILL.md first.",
      "Import or place the package into your OpenClaw setup."
    ],
    "agentAssist": {
      "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
      "steps": [
        "Download the package from Yavira.",
        "Extract it into a folder your agent can access.",
        "Paste one of the prompts below and point your agent at the extracted folder."
      ],
      "prompts": [
        {
          "label": "New install",
          "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
        },
        {
          "label": "Upgrade existing",
          "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
        }
      ]
    },
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-23T16:43:11.935Z",
      "expiresAt": "2026-04-30T16:43:11.935Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
        "contentDisposition": "attachment; filename=\"4claw-imageboard-1.0.1.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/gov-cybersecurity"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    },
    "downloadPageUrl": "https://openagent3.xyz/downloads/gov-cybersecurity",
    "agentPageUrl": "https://openagent3.xyz/skills/gov-cybersecurity/agent",
    "manifestUrl": "https://openagent3.xyz/skills/gov-cybersecurity/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/gov-cybersecurity/agent.md"
  },
  "agentAssist": {
    "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
    "steps": [
      "Download the package from Yavira.",
      "Extract it into a folder your agent can access.",
      "Paste one of the prompts below and point your agent at the extracted folder."
    ],
    "prompts": [
      {
        "label": "New install",
        "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
      },
      {
        "label": "Upgrade existing",
        "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
      }
    ]
  },
  "documentation": {
    "source": "clawhub",
    "primaryDoc": "SKILL.md",
    "sections": [
      {
        "title": "Government Cybersecurity Vulnerability Intel",
        "body": "Real-time vulnerability intelligence from 4 authoritative sources — no API keys required."
      },
      {
        "title": "Setup",
        "body": "Connect to the remote MCP server:\n\nmcporter add gov-cyber --url https://cybersecurity-vuln-mcp.apify.actor/mcp --transport streamable-http\n\nOr add directly to your OpenClaw MCP config (~/.openclaw/mcp.json):\n\n{\n  \"servers\": {\n    \"gov-cyber\": {\n      \"url\": \"https://cybersecurity-vuln-mcp.apify.actor/mcp\",\n      \"transport\": \"streamable-http\"\n    }\n  }\n}"
      },
      {
        "title": "vuln_lookup_cve",
        "body": "Look up a CVE by ID and get enriched intelligence from all 4 sources in a single call — NVD details (CVSS score, description, references), CISA KEV active exploitation status, EPSS exploitation probability, and MITRE ATT&CK techniques.\n\nLook up CVE-2021-44228\n\nExample output: CRITICAL 10.0, EPSS 94.4%, KEV=YES, ATT&CK: T1190/T1203/T1595.002"
      },
      {
        "title": "vuln_search",
        "body": "Search the NIST National Vulnerability Database by keyword, severity, and date range.\n\nSearch NVD for \"apache log4j\" critical vulnerabilities\n\nParameters: keyword, severity (LOW/MEDIUM/HIGH/CRITICAL), pubStartDate, pubEndDate, limit"
      },
      {
        "title": "vuln_kev_latest",
        "body": "Get recently added entries from the CISA Known Exploited Vulnerabilities catalog — confirmed actively exploited in the wild.\n\nShow KEV entries added in the last 7 days\n\nParameters: days (1-365, default 7), limit"
      },
      {
        "title": "vuln_kev_due_soon",
        "body": "Get CISA KEV vulnerabilities with upcoming remediation deadlines. Federal agencies must patch by the due date.\n\nShow KEV vulnerabilities due within 14 days\n\nParameters: days (1-90, default 14), limit"
      },
      {
        "title": "vuln_epss_top",
        "body": "Get CVEs with the highest EPSS exploitation probability scores. A score of 0.9 = 90% chance of exploitation in the next 30 days.\n\nShow CVEs with EPSS score above 0.9\n\nParameters: threshold (0-1, default 0.5), limit"
      },
      {
        "title": "vuln_trending",
        "body": "Get recently published critical and high severity CVEs. Stay on top of emerging threats.\n\nShow trending critical CVEs from the last 3 days\n\nParameters: days (1-30, default 3), severity, limit"
      },
      {
        "title": "vuln_by_vendor",
        "body": "Search CVEs for a specific vendor/product with KEV cross-referencing for actively exploited vulns.\n\nShow Microsoft Windows vulnerabilities\n\nParameters: vendor (required), product (optional), limit"
      },
      {
        "title": "Data Sources",
        "body": "NIST NVD 2.0 — National Vulnerability Database (CVE details, CVSS scores)\nCISA KEV — Known Exploited Vulnerabilities catalog\nFIRST.org EPSS — Exploitation Prediction Scoring System\nMITRE ATT&CK — Adversary techniques and tactics (172 CVEs mapped to 42 techniques)"
      },
      {
        "title": "Use Cases",
        "body": "Vulnerability triage and prioritization\nCompliance tracking (CISA KEV deadlines)\nVendor risk assessments\nThreat intelligence briefings\nPatch management decisions\n\nAll data from free US government APIs. Zero cost. No API keys required."
      }
    ],
    "body": "Government Cybersecurity Vulnerability Intel\n\nReal-time vulnerability intelligence from 4 authoritative sources — no API keys required.\n\nSetup\n\nConnect to the remote MCP server:\n\nmcporter add gov-cyber --url https://cybersecurity-vuln-mcp.apify.actor/mcp --transport streamable-http\n\n\nOr add directly to your OpenClaw MCP config (~/.openclaw/mcp.json):\n\n{\n  \"servers\": {\n    \"gov-cyber\": {\n      \"url\": \"https://cybersecurity-vuln-mcp.apify.actor/mcp\",\n      \"transport\": \"streamable-http\"\n    }\n  }\n}\n\nAvailable Tools\nvuln_lookup_cve\n\nLook up a CVE by ID and get enriched intelligence from all 4 sources in a single call — NVD details (CVSS score, description, references), CISA KEV active exploitation status, EPSS exploitation probability, and MITRE ATT&CK techniques.\n\nLook up CVE-2021-44228\n\n\nExample output: CRITICAL 10.0, EPSS 94.4%, KEV=YES, ATT&CK: T1190/T1203/T1595.002\n\nvuln_search\n\nSearch the NIST National Vulnerability Database by keyword, severity, and date range.\n\nSearch NVD for \"apache log4j\" critical vulnerabilities\n\n\nParameters: keyword, severity (LOW/MEDIUM/HIGH/CRITICAL), pubStartDate, pubEndDate, limit\n\nvuln_kev_latest\n\nGet recently added entries from the CISA Known Exploited Vulnerabilities catalog — confirmed actively exploited in the wild.\n\nShow KEV entries added in the last 7 days\n\n\nParameters: days (1-365, default 7), limit\n\nvuln_kev_due_soon\n\nGet CISA KEV vulnerabilities with upcoming remediation deadlines. Federal agencies must patch by the due date.\n\nShow KEV vulnerabilities due within 14 days\n\n\nParameters: days (1-90, default 14), limit\n\nvuln_epss_top\n\nGet CVEs with the highest EPSS exploitation probability scores. A score of 0.9 = 90% chance of exploitation in the next 30 days.\n\nShow CVEs with EPSS score above 0.9\n\n\nParameters: threshold (0-1, default 0.5), limit\n\nvuln_trending\n\nGet recently published critical and high severity CVEs. Stay on top of emerging threats.\n\nShow trending critical CVEs from the last 3 days\n\n\nParameters: days (1-30, default 3), severity, limit\n\nvuln_by_vendor\n\nSearch CVEs for a specific vendor/product with KEV cross-referencing for actively exploited vulns.\n\nShow Microsoft Windows vulnerabilities\n\n\nParameters: vendor (required), product (optional), limit\n\nData Sources\nNIST NVD 2.0 — National Vulnerability Database (CVE details, CVSS scores)\nCISA KEV — Known Exploited Vulnerabilities catalog\nFIRST.org EPSS — Exploitation Prediction Scoring System\nMITRE ATT&CK — Adversary techniques and tactics (172 CVEs mapped to 42 techniques)\nUse Cases\nVulnerability triage and prioritization\nCompliance tracking (CISA KEV deadlines)\nVendor risk assessments\nThreat intelligence briefings\nPatch management decisions\n\nAll data from free US government APIs. Zero cost. No API keys required."
  },
  "trust": {
    "sourceLabel": "tencent",
    "provenanceUrl": "https://clawhub.ai/martc03/gov-cybersecurity",
    "publisherUrl": "https://clawhub.ai/martc03/gov-cybersecurity",
    "owner": "martc03",
    "version": "1.0.0",
    "license": null,
    "verificationStatus": "Indexed source record"
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/gov-cybersecurity",
    "downloadUrl": "https://openagent3.xyz/downloads/gov-cybersecurity",
    "agentUrl": "https://openagent3.xyz/skills/gov-cybersecurity/agent",
    "manifestUrl": "https://openagent3.xyz/skills/gov-cybersecurity/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/gov-cybersecurity/agent.md"
  }
}