Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Provides real-time cyber and cognitive security threat intelligence, scoring and briefing relevant news, vulnerabilities, exploits, and influence operations...
Provides real-time cyber and cognitive security threat intelligence, scoring and briefing relevant news, vulnerabilities, exploits, and influence operations...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
A personal cyber threat intelligence and cognitive security analyst for OpenClaw. Monitors RSS feeds for security news, vulnerability disclosures, exploit drops, and influence operation reports. Scores items against your interests, delivers daily briefings, and provides on-demand deep-dive analysis of any threat โ technical or cognitive. This is ThreatMouth in your pocket. Cyber + cognitive security awareness from any chat app.
This skill turns your OpenClaw into a threat intelligence analyst that: Monitors cybersecurity RSS feeds (BleepingComputer, The Hacker News, Krebs on Security, CISA, Full Disclosure, Exploit-DB, SANS ISC, oss-security, Schneier, PacketStorm, DarkReading, and more) Monitors cognitive security feeds (EUvsDisinfo, DFRLab, Bellingcat, RAND, Seithar Research) Scores each item against your configured interest profile Delivers morning/evening briefings via your preferred chat app Provides on-demand deep-dive analysis of any CVE, vulnerability, exploit, influence operation, or campaign Tracks MITRE ATT&CK and DISARM framework technique mappings Discovers public proof-of-concept code for disclosed vulnerabilities Maintains a running threat landscape summary that evolves with the feed
"threat briefing" / "security briefing" / "morning briefing" / "what's new in security" "check threats" / "check feeds" / "any new vulns" "explain CVE-XXXX-XXXXX" / "deep dive on [topic]" / "analyze this threat" "cogdef briefing" / "cognitive security update" / "any new psyops" "what should I study today" / "learning recommendations" "threat landscape" / "what's trending in security" "poc for CVE-XXXX-XXXXX" / "any exploits for [software]" "seithar brief"
The operator should configure the following in their OpenClaw settings or by telling the agent directly:
Default schedule (configurable): Morning briefing: 8:00 AM local โ top 5 items from overnight, any critical alerts Evening briefing: 6:00 PM local โ day summary, items scored > 0.7, study recommendations Critical alerts: Immediate โ items scored > 0.9 pushed as soon as detected Tell your OpenClaw: "Change my briefing time to 9 AM and 7 PM" or "Only send critical alerts, no scheduled briefings"
Default: every 2 hours. The skill uses OpenClaw's cron/heartbeat system to periodically fetch and process feeds.
On each check interval, the skill instructs the agent to: Fetch RSS feeds from the configured source list using the web_fetch tool Parse feed entries (title, link, published date, summary/description) Deduplicate against previously seen items (tracked in memory by URL hash) For each new item, score it against the operator's interest profile
Each new item is scored 0.0 to 1.0 against the operator's profile: 0.9 - 1.0: Critical โ matches core interests directly, high urgency (active exploitation, 0-day, major campaign) 0.7 - 0.9: High โ relevant to interests, worth reading today 0.5 - 0.7: Medium โ tangentially relevant, include in digest Below 0.5: Low โ skip unless specifically requested The agent scores by examining the item's title, summary, source, and any CVE/technique references against the stored interest profile. No external API needed โ the LLM does the scoring inline.
Items are categorized into: CRITICAL ALERT โ Active exploitation, 0-day, critical infrastructure EXPLOIT DROP โ New CVE, PoC release, vulnerability disclosure MALWARE โ Malware analysis, RE findings, campaign reports INFLUENCE OP โ Disinformation campaigns, cognitive security, DISARM-mapped operations TECHNIQUE โ ATT&CK or DISARM technique deep-dives, methodology LEARNING โ Tutorials, CTF writeups, educational content GENERAL โ Industry news, policy, commentary
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ SEITHAR INTELLIGENCE BRIEFING โ โ 2026-02-11 08:00 EST โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ CRITICAL (act now): ๐ด [0.95] Pre-auth RCE in OpenSSH (CVE-2026-XXXXX) Full Disclosure | 2h ago Affects OpenSSH 9.x. Public PoC available. โธ Say "deep dive CVE-2026-XXXXX" for full analysis HIGH RELEVANCE: ๐ [0.87] Lazarus Group deploys new social engineering toolkit targeting crypto developers The Hacker News | 4h ago DISARM: T0047 (Develop Content), ATT&CK: T1566.001 โธ Say "deep dive lazarus social engineering" for analysis ๐ [0.82] New Nuclei templates for Spring4Shell variants Exploit-DB | 6h ago 12 new detection templates + PoC payloads โธ Say "explain spring4shell" for context ๐ [0.78] Russian influence operation targeting NATO narratives detected across 3 platforms DFRLab | 5h ago DISARM: T0046, T0048, T0056 | Coordinated inauthentic behavior โธ Say "deep dive nato influence op" for DISARM breakdown STUDY RECOMMENDATION: Based on today's feed: review SSH key exchange internals and pre-authentication attack surfaces. OverTheWire Bandit levels 14-17 cover SSH fundamentals. โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ 24 items collected | 4 high relevance | 1 critical Seithar Intelligence Division v1.0 ่ช็ฅไฝๆฆ | seithar.com/research โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
When the operator says "deep dive [topic]" or "explain [CVE]", the skill: Fetches the full article content via web_fetch If a CVE is mentioned, queries the NVD API for structured vuln data Searches GitHub for public PoC repositories (https://api.github.com/search/repositories?q=CVE-XXXX-XXXXX&sort=stars) Generates a structured educational breakdown: โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ SEITHAR DEEP DIVE โ โ CVE-2026-XXXXX โ OpenSSH Pre-Auth RCE โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ WHAT HAPPENED: A memory corruption vulnerability in OpenSSH's key exchange handler allows unauthenticated attackers to achieve remote code execution as root. No credentials required. HOW THE EXPLOIT WORKS: 1. Attacker connects to SSH port 22 2. During key exchange (before authentication), sends oversized payload in the KEX_INIT message 3. Buffer overflow overwrites return address on stack 4. Execution redirected to attacker's shellcode 5. Root shell achieved โ no credentials needed Pseudocode: connect(target, 22) send(kex_init_with_overflow_payload) # Stack is now corrupted # Return address points to shellcode # Root shell spawns MITRE ATT&CK: T1190 โ Exploit Public-Facing Application T1068 โ Exploitation for Privilege Escalation PROOF OF CONCEPT: โญ 234 github.com/researcher/CVE-2026-XXXXX (Python) โญ 45 github.com/other/openssh-rce-poc (C) Key file to study: exploit.py lines 40-80 (payload construction) CONCEPTS TO UNDERSTAND: โ Stack-based buffer overflow (study: OverTheWire Narnia) โ SSH key exchange protocol (RFC 4253) โ ASLR bypass techniques โ Return-oriented programming (ROP) LAB EXERCISE: docker pull vulhub/openssh:9.x Practice in isolated environment. Never test against production systems. DEFENSIVE PERSPECTIVE: Detection: Anomalous packet sizes during SSH handshake Prevention: Upgrade to OpenSSH 9.x.x, restrict SSH access Log analysis: Look for connection resets during KEX phase โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ Seithar Intelligence Division v1.0 ่ช็ฅไฝๆฆ | seithar.com/research โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ For influence operations, the deep dive maps to DISARM instead: โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ SEITHAR DEEP DIVE โ COGNITIVE โ โ Russian NATO Narrative Operation โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ WHAT HAPPENED: Coordinated inauthentic behavior detected across Twitter/X, Telegram, and Facebook targeting NATO unity narratives in Baltic states. ~200 accounts activated within 48h window. DISARM MAPPING: Plan: T0073 โ Determine Target Audiences (Baltic publics) T0047 โ Develop Content (localized memes, fake news articles) Prepare: T0048 โ Develop Online Personas (aged accounts reactivated) T0046 โ Use Existing Narratives (energy costs, immigration) Execute: T0049 โ Flood Information Space T0056 โ Amplify Existing Content (cross-platform coordination) TECHNIQUES DETECTED: โธ Narrative Piggybacking โ latched onto real energy cost concerns, added fabricated escalation claims โธ Coordinated Amplification โ same framing appeared across platforms within 2-hour window, suggesting central dispatch โธ Emotional Anchoring โ content led with fear/anger triggers before introducing anti-NATO framing SEITHAR TAXONOMY: SCT-003 (Substrate Priming) โ Initial wave didn't carry explicit anti-NATO messaging. It primed emotional state (anxiety about energy costs) so subsequent waves could introduce the geopolitical framing. SCT-005 (Amplification Embedding) โ Content designed so that debunking it still spreads the core claim. SCT-007 (Wetiko Pattern) โ Target audiences began reproducing the framing as "their own analysis" within 48h of initial exposure. DEFENSIVE PERSPECTIVE: Inoculation: Pre-bunking energy cost narratives with accurate data before the operation gains traction. Detection: Monitor for coordinated posting patterns (same framing, multiple accounts, tight time window). Counter: Highlight the coordination pattern itself rather than debunking individual claims. โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ Seithar Intelligence Division v1.0 ่ช็ฅไฝๆฆ | seithar.com/research โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
SourceFeed URLCategoryThe Hacker Newshttps://feeds.feedburner.com/TheHackersNewsgeneral, malware, exploitBleepingComputerhttps://www.bleepingcomputer.com/feed/general, malwareKrebs on Securityhttps://krebsonsecurity.com/feed/general, cybercrimeCISA Alertshttps://www.cisa.gov/cybersecurity-advisories/all.xmlcritical, advisoryFull Disclosurehttps://seclists.org/rss/fulldisclosure.rssexploit, disclosureoss-securityhttps://seclists.org/rss/oss-sec.rssexploit, disclosureExploit-DBhttps://www.exploit-db.com/rss.xmlexploit, pocSANS ISChttps://isc.sans.edu/rssfeed.xmlgeneral, techniquePacketStormhttps://packetstormsecurity.com/feeds/headlines.xmlexploit, toolsSchneier on Securityhttps://www.schneier.com/feed/commentary, cryptoDark Readinghttps://www.darkreading.com/rss.xmlgeneral, enterprise
SourceFeed URLCategoryEUvsDisinfohttps://euvsdisinfo.eu/feed/influence_op, disinfoBellingcathttps://www.bellingcat.com/feed/osint, investigationDFRLab (Atlantic Council)https://www.atlanticcouncil.org/category/digital-forensic-research-lab/feed/influence_op, analysisRAND Cyber/Infohttps://www.rand.org/topics/cyber-and-data-sciences.xmlresearch, policyRecorded Future (Insikt)https://www.recordedfuture.com/feedthreat_intel, apt
SourceFeed URLCategoryr/netsechttps://www.reddit.com/r/netsec/.rsscommunity, techniquer/ReverseEngineeringhttps://www.reddit.com/r/ReverseEngineering/.rssre, techniqueProject Zerohttps://googleprojectzero.blogspot.com/feeds/posts/defaultresearch, exploitMalwarebytes Labshttps://www.malwarebytes.com/blog/feedmalware, consumerTroy Hunthttps://www.troyhunt.com/rss/general, web_securityGraham Cluleyhttps://grahamcluley.com/feed/general, commentaryRisky Businesshttps://risky.biz/feeds/risky-business/podcast, commentary The operator can add or remove sources by telling the agent: "Add this RSS feed to my threat sources: [url]" or "Remove Dark Reading from my feeds."
The skill uses OpenClaw's persistent memory to track: { "seithar_intel": { "profile": { "interests": ["malware analysis", "social engineering", "network exploitation"], "skill_level": "intermediate", "currently_studying": ["MITRE ATT&CK", "DISARM", "OverTheWire"], "deprioritize": ["enterprise compliance", "cloud IAM"] }, "feeds": { "sources": ["list of active RSS URLs"], "custom_sources": ["user-added URLs"], "check_interval_hours": 2, "briefing_times": ["08:00", "18:00"] }, "seen_items": { "url_hashes": ["hash1", "hash2"], "last_check": "2026-02-11T14:00:00Z", "items_today": 24, "high_relevance_today": 4 }, "stats": { "total_items_processed": 1847, "deep_dives_requested": 23, "top_sources_by_relevance": { "fulldisclosure": 0.82, "exploit_db": 0.79, "euvsdisinfo": 0.76 }, "most_seen_techniques": { "T1566.001": 12, "T0049": 8, "T1190": 7 } }, "study_log": { "deep_dives_completed": ["CVE-2026-XXXXX", "lazarus_social_engineering"], "techniques_studied": ["T1190", "T0049", "SCT-003"], "recommended_next": "SSH key exchange internals" } } }
Using OpenClaw's heartbeat/cron system, the skill proactively: Checks feeds on the configured interval without being asked Pushes critical alerts immediately when items score > 0.9 Sends scheduled briefings at configured times Tracks study progress โ if the operator does a deep dive on a topic, related items in future feeds are boosted in scoring Notices patterns โ if multiple sources report on the same CVE or campaign within 24h, it flags convergence: "Multiple sources reporting on CVE-XXXX-XXXXX. This is gaining traction โ consider prioritizing." Weekly summary โ every Sunday, a summary of the week's threat landscape: top CVEs, active campaigns, technique trends, and study recommendations for the coming week
The agent reads this and knows how to operate. No external code needed โ OpenClaw's built-in web_fetch, web_search, memory, and cron tools handle everything.
List of RSS feed URLs with categories and check intervals. The agent reads this file when performing feed checks.
Reference list of DISARM techniques with IDs, names, and one-line descriptions. The agent uses this to map influence operations to framework codes.
Reference list of MITRE ATT&CK techniques (top 50 most relevant). Used for technique mapping in deep dives.
SCT-001 through SCT-007 Seithar Cognitive Defense Taxonomy. Used in cognitive security analysis.
clawhub install seithar-intel Or manually: git clone https://github.com/Mirai8888/seithar-intel # Copy to your OpenClaw skills directory cp -r seithar-intel ~/clawd/skills/ Then tell your OpenClaw: "Set up my security interest profile" and describe your interests.
Every output carries: โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ Seithar Intelligence Division v1.0 ่ช็ฅไฝๆฆ | seithar.com/research โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ When users screenshot briefings and share them, the brand travels. When they say "my Seithar feed flagged this," the terminology propagates. The skill is the distribution channel.
seithar-intel is the lightweight personal version of ThreatMouth (the full Discord bot). It uses the same scoring methodology, the same source list, and the same educational deep-dive format, but runs entirely within OpenClaw on the operator's machine. seithar-cogdef (separate skill) handles analysis of specific content for manipulation. seithar-intel handles the ongoing feed of threats and cognitive security events. Together they provide: continuous awareness (intel) + on-demand analysis (cogdef). Install both: clawhub install seithar-intel clawhub install seithar-cogdef ่ช็ฅไฝๆฆ | seithar.com
Identity, auth, scanning, governance, audit, and operational guardrails.
Largest current source with strong distribution and engagement signals.