Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Soc2 Evidence Collector

Generate SOC2 evidence collection checklists, automate evidence gathering scripts, and produce audit-ready evidence packages. Covers all 5 Trust Service Crit...

MIT-0 · Free to use, modify, and redistribute. No attribution required.
0 · 38 · 0 current installs · 0 all-time installs
MIT-0
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name/description match the content: the skill aims to produce evidence checklists and automated collection scripts for cloud, GitHub, and IdP platforms. That capability is coherent with the stated purpose. However, generating runnable collection scripts for multiple platforms inherently requires credentials, API tokens or console access that are not described in the metadata (no required env vars or config paths). The absence of any declared credential requirements is a notable omission but could be explained if the agent always asks interactively for credentials or instructs the user to run scripts locally.
!
Instruction Scope
The SKILL.md instructs the agent to generate scripts and instructions to export logs, IAM mappings, terraform state, console configs, HR exports, calendar screenshots, and other sensitive artifacts across cloud providers and IdPs. Those instructions imply collection of highly sensitive data (credentials, logs, PII). The document does not explicitly constrain what the agent may ask for or where collected evidence may be sent; it also does not require explicit user approval steps before creating or transmitting evidence. This open scope increases the risk the agent might request or assemble sensitive artifacts in ways the user didn't expect.
Install Mechanism
This is an instruction-only skill with no install spec and no bundled code — low disk footprint and no remote install URLs. That minimizes supply-chain risk from the package itself.
!
Credentials
The skill will need access to cloud consoles, IdPs, GitHub, HR systems, and possibly on-prem systems to collect evidence, but the registry metadata declares no required environment variables, credentials, or config paths. That mismatch means the skill either expects interactive credential entry, will produce scripts that require credentials, or will instruct the user to run commands themselves — the SKILL.md does not make the handling, scoping (read-only vs. admin), or lifetime (temporary vs. permanent) of secrets explicit. Requesting broad access to many services without specifying least-privilege guidance is disproportionate.
Persistence & Privilege
The skill is not marked always:true and does not request any system-level persistence. It is user-invocable and allows model invocation (normal default). There is no evidence in the package of attempts to modify other skills or system-wide agent settings.
What to consider before installing
This skill can legitimately help prepare SOC2 evidence, but proceed with caution: - Ask the agent (before providing anything) exactly how it will collect credentials and where it will store or transmit collected evidence. Do not paste sensitive credentials into chat unless you understand and trust the destination. - Prefer issuing temporary, least-privilege, read-only API tokens (for AWS/GCP/Azure, GitHub, and your IdP) and set short expirations. Never supply root or full-admin credentials. - Require the agent to produce scripts first and review them manually before execution. Run any generated scripts in an isolated environment (sandbox or dedicated machine) and inspect network activity if possible. - Confirm the skill will not upload evidence packages to external endpoints you do not control; ask for explicit filenames/paths and retention policies. - If you plan to allow autonomous agent invocation, restrict that until you’ve tested the workflow manually; consider disabling autonomous runs for this skill. Given the skill is instruction-only and the package contains no code, the absence of scan findings is not a guarantee of safety — verify credential handling and review outputs before using in production.

Like a lobster shell, security has layers — review code before you run it.

Current versionv1.0.0
Download zip
latestvk97c5sqtttj42e38ppcw7h9cyd832prn

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

SKILL.md

SOC2 Evidence Collector

Automate evidence gathering for SOC2 Type I and Type II audits across all 5 Trust Service Criteria.

When to Use

  • Preparing for an upcoming SOC2 audit (Type I or Type II)
  • Building continuous compliance evidence pipelines
  • Auditor requests evidence and you need to gather it fast
  • Onboarding a new client who requires SOC2 compliance proof
  • Annual evidence refresh cycle
  • Gap analysis before engaging an audit firm

Input

Gather these from the user before generating:

Required

  1. Audit type: Type I (point-in-time) or Type II (over a period, typically 3-12 months)
  2. Trust Service Criteria in scope: Security (CC — always required), plus any of: Availability, Processing Integrity, Confidentiality, Privacy
  3. Cloud provider(s): AWS, GCP, Azure, multi-cloud, on-prem, hybrid
  4. Primary tech stack: languages, frameworks, CI/CD, IaC tools
  5. Team size: engineering + ops headcount

Optional

  • Current compliance certifications (ISO 27001, HIPAA, PCI-DSS, etc.)
  • Audit firm name and timeline
  • Previous audit findings or gaps
  • Specific control frameworks already mapped (NIST 800-53, CIS, etc.)
  • SSO/IdP provider (Okta, Azure AD, Google Workspace, etc.)

Evidence Categories

CC — Common Criteria (Security) — Always In Scope

CC1: Control Environment

EvidenceSourceCollection Method
Org chart with security rolesHR system / ConfluenceManual export quarterly
Security policy documentsPolicy repo / wikiGit log showing annual review
Code of conduct acknowledgmentsHR systemExport signed acknowledgments
Board/management meeting minutes on securityCalendar + notesScreenshot + agenda export
Risk assessment documentationGRC tool / spreadsheetExport current risk register

CC2: Communication and Information

EvidenceSourceCollection Method
Security awareness training recordsLMS / training platformCompletion report export
Onboarding security checklistHR systemTemplate + completion logs
Incident communication proceduresRunbook / wikiVersion-controlled doc with review history
External communication policiesPolicy repoGit log + approval records

CC3: Risk Assessment

EvidenceSourceCollection Method
Annual risk assessment reportGRC toolPDF export with sign-off
Vendor risk assessmentsVendor management toolExport assessment records
Penetration test reportsSecurity vendorPDF reports with remediation tracking
Vulnerability scan resultsScanner (Qualys, Nessus, etc.)Automated export, monthly

CC4: Monitoring Activities

EvidenceSourceCollection Method
SIEM dashboards and alert configsDatadog / Splunk / CloudWatchScreenshot + config export
Uptime monitoring evidencePingdom / Datadog / UptimeRobotMonthly uptime reports
Log retention configurationCloud provider consoleConfig export / IaC snippet
Anomaly detection rulesSIEM / monitoring toolRule export with change log

CC5: Control Activities

EvidenceSourceCollection Method
Access control matrixIdP / IAM consoleExport user-role mappings
MFA enforcement evidenceIdP admin consolePolicy config screenshot
Firewall / security group rulesCloud console / IaCterraform state or console export
Encryption at rest configurationCloud console / IaCConfig export showing encryption enabled
Encryption in transit (TLS)Load balancer / CDN configCertificate + config export

CC6: Logical and Physical Access Controls

EvidenceSourceCollection Method
User access reviews (quarterly)IdP + spreadsheetReview meeting notes + updated access list
Terminated user deprovisioningIdP audit logExport showing timely deactivation
SSH key / credential rotation logsSecrets managerRotation event logs
Physical access logs (if applicable)Building managementBadge access reports

CC7: System Operations

EvidenceSourceCollection Method
Change management recordsJira / GitHub PRsExport merged PRs with approvals
CI/CD pipeline configurationGitHub Actions / CircleCIConfig file export from repo
Deployment approval processPR review settingsBranch protection rule screenshots
Incident response logsPagerDuty / OpsgenieIncident timeline exports
Backup configuration and test resultsCloud console / IaCBackup policy + restore test logs

CC8: Change Management

EvidenceSourceCollection Method
PR review requirementsGitHub / GitLab settingsBranch protection config
Code review evidenceGitHub PR historyExport PRs with review comments
Release notes / changelogsRepoCHANGELOG.md with version history
Rollback proceduresRunbookDocumented procedure with test evidence

CC9: Risk Mitigation

EvidenceSourceCollection Method
Business continuity planPolicy repoDocument with annual review evidence
Disaster recovery test resultsDR runbookTest execution logs + results
Insurance certificatesFinance / legalCurrent certificate copies
Sub-processor agreementsLegal / contract managementSigned DPAs + vendor list

A — Availability (If In Scope)

EvidenceSourceCollection Method
SLA definitions and monitoringProduct docs + monitoringSLA doc + uptime dashboard exports
Capacity planning documentationArchitecture docsQuarterly capacity review notes
Auto-scaling configurationCloud console / IaCConfig export
Incident response SLA adherencePagerDuty / incident trackerResponse time reports
Redundancy / failover configurationCloud architectureArchitecture diagram + failover test logs

PI — Processing Integrity (If In Scope)

EvidenceSourceCollection Method
Data validation rulesApplication code / configCode snippets + test results
QA / testing proceduresCI/CD pipelineTest suite config + pass/fail reports
Error handling and correction proceduresRunbook / codeError handling docs + incident examples
Data reconciliation reportsApplication logs / reportsMonthly reconciliation output

C — Confidentiality (If In Scope)

EvidenceSourceCollection Method
Data classification policyPolicy repoDocument with review history
NDA / confidentiality agreementsLegal / HRSigned agreement copies
Data retention and disposal policyPolicy repoPolicy doc + disposal logs
DLP tool configurationDLP tool adminConfig export + alert samples

P — Privacy (If In Scope)

EvidenceSourceCollection Method
Privacy policy (public)WebsiteURL + version history
Data processing agreementsLegalSigned DPAs
Consent management recordsCMP / applicationConsent log exports
Data subject request proceduresPolicy repo / ticketingProcedure doc + DSR ticket samples
Privacy impact assessmentsGRC tool / docsPIA reports for high-risk processing

Automation Scripts

When the user's stack is identified, generate shell scripts for automated evidence collection:

AWS Evidence Collection (example)

#!/bin/bash
# SOC2 Evidence Collector — AWS
# Generated by AfrexAI SOC2 Evidence Collector skill
set -euo pipefail

EVIDENCE_DIR="soc2-evidence/$(date +%Y-%m-%d)"
mkdir -p "$EVIDENCE_DIR"/{iam,network,encryption,logging,compute}

echo "=== CC5: Access Controls ==="
aws iam get-account-summary > "$EVIDENCE_DIR/iam/account-summary.json"
aws iam generate-credential-report && sleep 5
aws iam get-credential-report --output text --query Content | base64 -d > "$EVIDENCE_DIR/iam/credential-report.csv"
aws iam list-users --output json > "$EVIDENCE_DIR/iam/users.json"
aws iam list-policies --scope Local --output json > "$EVIDENCE_DIR/iam/custom-policies.json"

echo "=== CC5: Encryption at Rest ==="
aws rds describe-db-instances --query 'DBInstances[*].{ID:DBInstanceIdentifier,Encrypted:StorageEncrypted,KmsKey:KmsKeyId}' > "$EVIDENCE_DIR/encryption/rds-encryption.json"
aws s3api list-buckets --query 'Buckets[*].Name' --output text | tr '\t' '\n' | while read bucket; do
  aws s3api get-bucket-encryption --bucket "$bucket" >> "$EVIDENCE_DIR/encryption/s3-encryption.json" 2>/dev/null || echo "{\"bucket\":\"$bucket\",\"encryption\":\"NONE\"}" >> "$EVIDENCE_DIR/encryption/s3-encryption.json"
done

echo "=== CC4: Logging ==="
aws cloudtrail describe-trails > "$EVIDENCE_DIR/logging/cloudtrail-config.json"
aws cloudwatch describe-alarms --state-value ALARM > "$EVIDENCE_DIR/logging/active-alarms.json"

echo "=== CC5: Network Security ==="
aws ec2 describe-security-groups > "$EVIDENCE_DIR/network/security-groups.json"
aws ec2 describe-vpcs > "$EVIDENCE_DIR/network/vpcs.json"

echo "=== CC6: MFA Status ==="
aws iam list-virtual-mfa-devices > "$EVIDENCE_DIR/iam/mfa-devices.json"

echo "Evidence collected in $EVIDENCE_DIR"
echo "Review and redact sensitive values before sharing with auditors."

GitHub Evidence Collection (example)

#!/bin/bash
# SOC2 Evidence Collector — GitHub
set -euo pipefail

ORG="${1:?Usage: $0 <github-org>}"
EVIDENCE_DIR="soc2-evidence/$(date +%Y-%m-%d)/github"
mkdir -p "$EVIDENCE_DIR"

echo "=== CC8: Branch Protection ==="
gh api "/orgs/$ORG/repos" --paginate --jq '.[].name' | while read repo; do
  gh api "/repos/$ORG/$repo/branches/main/protection" 2>/dev/null > "$EVIDENCE_DIR/${repo}-branch-protection.json" || true
done

echo "=== CC7: Recent Deployments ==="
gh api "/orgs/$ORG/repos" --paginate --jq '.[].name' | head -10 | while read repo; do
  gh api "/repos/$ORG/$repo/deployments?per_page=10" > "$EVIDENCE_DIR/${repo}-deployments.json" 2>/dev/null || true
done

echo "=== CC8: PR Review Evidence ==="
gh api "/orgs/$ORG/repos" --paginate --jq '.[].name' | head -10 | while read repo; do
  gh pr list --repo "$ORG/$repo" --state merged --limit 20 --json number,title,mergedAt,reviewDecision > "$EVIDENCE_DIR/${repo}-merged-prs.json" 2>/dev/null || true
done

echo "=== CC5: Org Security Settings ==="
gh api "/orgs/$ORG" --jq '{two_factor_requirement: .two_factor_requirement_enabled, default_permissions: .default_repository_permission}' > "$EVIDENCE_DIR/org-security.json"

echo "Evidence collected in $EVIDENCE_DIR"

Output Format

Generate a structured evidence package:

soc2-evidence/
├── README.md                    # Overview, scope, period, auditor info
├── evidence-matrix.md           # Full checklist with status (collected/pending/N-A)
├── collection-scripts/
│   ├── collect-aws.sh
│   ├── collect-github.sh
│   ├── collect-idp.sh
│   └── collect-monitoring.sh
├── gap-analysis.md              # Missing evidence + remediation steps
└── schedule.md                  # Evidence collection calendar (what to refresh when)

evidence-matrix.md Format

| # | Control | Evidence | Status | Source | Last Collected | Notes |
|---|---------|----------|--------|--------|---------------|-------|
| CC1.1 | Org chart | org-chart-2026-Q1.pdf | ✅ Collected | HR export | 2026-01-15 | |
| CC5.3 | MFA enforcement | mfa-config.json | ✅ Automated | IdP API | 2026-03-17 | Script: collect-idp.sh |
| CC3.2 | Pen test report | — | ⏳ Pending | External vendor | — | Due 2026-04-01 |

Workflow

  1. Gather inputs (audit type, scope, stack, team size)
  2. Generate the full evidence matrix for in-scope criteria
  3. Mark known evidence sources based on their stack
  4. Generate collection scripts for automated gathering
  5. Identify gaps and generate remediation recommendations
  6. Create an evidence collection schedule (daily/weekly/monthly/quarterly)
  7. Output the complete evidence package

Tips for Users

  • Start 3-6 months before audit: evidence gaps take time to fill
  • Automate early: scripts that run monthly save panic before audit
  • Version everything: auditors love seeing change history
  • Don't fake it: missing evidence is better than fabricated evidence
  • Continuous > point-in-time: Type II requires sustained evidence over the audit period
  • Tag evidence: use consistent naming so auditors can self-serve

AfrexAI Note

This skill generates the framework and automation scaffolding. For hands-on SOC2 audit preparation with managed AI agents handling continuous evidence collection, monitoring, and auditor coordination — that's what AfrexAI's AI-as-a-Service delivers. Contact us at hello@afrexai.com.

Files

2 total
Select a file
Select a file to preview.

Comments

Loading comments…