Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Comprehensive SecOps skill for application security, vulnerability management, compliance, and secure development practices. Includes security scanning, vulnerability assessment, compliance checking, and security automation. Use when implementing security controls, conducting security audits, responding to vulnerabilities, or ensuring compliance requirements.
Comprehensive SecOps skill for application security, vulnerability management, compliance, and secure development practices. Includes security scanning, vulnerability assessment, compliance checking, and security automation. Use when implementing security controls, conducting security audits, responding to vulnerabilities, or ensuring compliance requirements.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Complete toolkit for Security Operations including vulnerability management, compliance verification, secure coding practices, and security automation.
Core Capabilities Workflows Tool Reference Security Standards Compliance Frameworks Best Practices
Scan source code for security vulnerabilities including hardcoded secrets, SQL injection, XSS, command injection, and path traversal. # Scan project for security issues python scripts/security_scanner.py /path/to/project # Filter by severity python scripts/security_scanner.py /path/to/project --severity high # JSON output for CI/CD python scripts/security_scanner.py /path/to/project --json --output report.json Detects: Hardcoded secrets (API keys, passwords, AWS credentials, GitHub tokens, private keys) SQL injection patterns (string concatenation, f-strings, template literals) XSS vulnerabilities (innerHTML assignment, unsafe DOM manipulation, React unsafe patterns) Command injection (shell=True, exec, eval with user input) Path traversal (file operations with user input)
Scan dependencies for known CVEs across npm, Python, and Go ecosystems. # Assess project dependencies python scripts/vulnerability_assessor.py /path/to/project # Critical/high only python scripts/vulnerability_assessor.py /path/to/project --severity high # Export vulnerability report python scripts/vulnerability_assessor.py /path/to/project --json --output vulns.json Scans: package.json and package-lock.json (npm) requirements.txt and pyproject.toml (Python) go.mod (Go) Output: CVE IDs with CVSS scores Affected package versions Fixed versions for remediation Overall risk score (0-100)
Verify security compliance against SOC 2, PCI-DSS, HIPAA, and GDPR frameworks. # Check all frameworks python scripts/compliance_checker.py /path/to/project # Specific framework python scripts/compliance_checker.py /path/to/project --framework soc2 python scripts/compliance_checker.py /path/to/project --framework pci-dss python scripts/compliance_checker.py /path/to/project --framework hipaa python scripts/compliance_checker.py /path/to/project --framework gdpr # Export compliance report python scripts/compliance_checker.py /path/to/project --json --output compliance.json Verifies: Access control implementation Encryption at rest and in transit Audit logging Authentication strength (MFA, password hashing) Security documentation CI/CD security controls
Complete security assessment of a codebase. # Step 1: Scan for code vulnerabilities python scripts/security_scanner.py . --severity medium # STOP if exit code 2 โ resolve critical findings before continuing # Step 2: Check dependency vulnerabilities python scripts/vulnerability_assessor.py . --severity high # STOP if exit code 2 โ patch critical CVEs before continuing # Step 3: Verify compliance controls python scripts/compliance_checker.py . --framework all # STOP if exit code 2 โ address critical gaps before proceeding # Step 4: Generate combined reports python scripts/security_scanner.py . --json --output security.json python scripts/vulnerability_assessor.py . --json --output vulns.json python scripts/compliance_checker.py . --json --output compliance.json
Integrate security checks into deployment pipeline. # .github/workflows/security.yml name: "security-scan" on: pull_request: branches: [main, develop] jobs: security-scan: runs-on: ubuntu-latest steps: - uses: actions/checkout@v4 - name: "set-up-python" uses: actions/setup-python@v5 with: python-version: '3.11' - name: "security-scanner" run: python scripts/security_scanner.py . --severity high - name: "vulnerability-assessment" run: python scripts/vulnerability_assessor.py . --severity critical - name: "compliance-check" run: python scripts/compliance_checker.py . --framework soc2 Each step fails the pipeline on its respective exit code โ no deployment proceeds past a critical finding.
Respond to a new CVE affecting your application. 1. ASSESS (0-2 hours) - Identify affected systems using vulnerability_assessor.py - Check if CVE is being actively exploited - Determine CVSS environmental score for your context - STOP if CVSS 9.0+ on internet-facing system โ escalate immediately 2. PRIORITIZE - Critical (CVSS 9.0+, internet-facing): 24 hours - High (CVSS 7.0-8.9): 7 days - Medium (CVSS 4.0-6.9): 30 days - Low (CVSS < 4.0): 90 days 3. REMEDIATE - Update affected dependency to fixed version - Run security_scanner.py to verify fix (must return exit code 0) - STOP if scanner still flags the CVE โ do not deploy - Test for regressions - Deploy with enhanced monitoring 4. VERIFY - Re-run vulnerability_assessor.py - Confirm CVE no longer reported - Document remediation actions
OptionDescriptiontargetDirectory or file to scan--severity, -sMinimum severity: critical, high, medium, low--verbose, -vShow files as they're scanned--jsonOutput results as JSON--output, -oWrite results to file Exit Codes: 0 = no critical/high findings ยท 1 = high severity findings ยท 2 = critical severity findings
OptionDescriptiontargetDirectory containing dependency files--severity, -sMinimum severity: critical, high, medium, low--verbose, -vShow files as they're scanned--jsonOutput results as JSON--output, -oWrite results to file Exit Codes: 0 = no critical/high vulnerabilities ยท 1 = high severity vulnerabilities ยท 2 = critical severity vulnerabilities
OptionDescriptiontargetDirectory to check--framework, -fFramework: soc2, pci-dss, hipaa, gdpr, all--verbose, -vShow checks as they run--jsonOutput results as JSON--output, -oWrite results to file Exit Codes: 0 = compliant (90%+ score) ยท 1 = non-compliant (50-69% score) ยท 2 = critical gaps (<50% score)
See references/security_standards.md for OWASP Top 10 full guidance, secure coding standards, authentication requirements, and API security controls.
See references/compliance_requirements.md for full control mappings. Run compliance_checker.py to verify the controls below:
CC6 Logical Access: authentication, authorization, MFA CC7 System Operations: monitoring, logging, incident response CC8 Change Management: CI/CD, code review, deployment controls
Req 3/4: Encryption at rest and in transit (TLS 1.2+) Req 6: Secure development (input validation, secure coding) Req 8: Strong authentication (MFA, password policy) Req 10/11: Audit logging, SAST/DAST/penetration testing
Unique user IDs and audit trails for PHI access (164.312(a)(1), 164.312(b)) MFA for person/entity authentication (164.312(d)) Transmission encryption via TLS (164.312(e)(1))
Art 25/32: Privacy by design, encryption, pseudonymization Art 33: Breach notification within 72 hours Art 17/20: Right to erasure and data portability
# BAD: Hardcoded secret API_KEY = "sk-1234567890abcdef" # GOOD: Environment variable import os API_KEY = os.environ.get("API_KEY") # BETTER: Secrets manager from your_vault_client import get_secret API_KEY = get_secret("api/key")
# BAD: String concatenation query = f"SELECT * FROM users WHERE id = {user_id}" # GOOD: Parameterized query cursor.execute("SELECT * FROM users WHERE id = %s", (user_id,))
// BAD: Direct innerHTML assignment is vulnerable // GOOD: Use textContent (auto-escaped) element.textContent = userInput; // GOOD: Use sanitization library for HTML import DOMPurify from 'dompurify'; const safeHTML = DOMPurify.sanitize(userInput);
// Password hashing const bcrypt = require('bcrypt'); const SALT_ROUNDS = 12; // Hash password const hash = await bcrypt.hash(password, SALT_ROUNDS); // Verify password const match = await bcrypt.compare(password, hash);
// Express.js security headers const helmet = require('helmet'); app.use(helmet()); // Or manually set headers: app.use((req, res, next) => { res.setHeader('X-Content-Type-Options', 'nosniff'); res.setHeader('X-Frame-Options', 'DENY'); res.setHeader('X-XSS-Protection', '1; mode=block'); res.setHeader('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'); res.setHeader('Content-Security-Policy', "default-src 'self'"); next(); });
DocumentDescriptionreferences/security_standards.mdOWASP Top 10, secure coding, authentication, API securityreferences/vulnerability_management_guide.mdCVE triage, CVSS scoring, remediation workflowsreferences/compliance_requirements.mdSOC 2, PCI-DSS, HIPAA, GDPR full control mappings
Identity, auth, scanning, governance, audit, and operational guardrails.
Largest current source with strong distribution and engagement signals.