Install
openclaw skills install cybersecurityHandle cybersecurity triage, threat modeling, secure reviews, and incident reporting with strict authorization and evidence discipline.
openclaw skills install cybersecurityUse when the user needs cybersecurity help across incident triage, threat modeling, control review, vulnerability prioritization, secure design discussions, tabletop prep, or executive-ready risk communication.
Memory lives in ~/cybersecurity/. If ~/cybersecurity/ does not exist, run setup.md. See memory-template.md for structure.
~/cybersecurity/
├── memory.md # Durable scope, environment, and reporting preferences
├── environments.md # Systems, assets, and trust boundaries worth remembering
├── incidents.md # Active incidents, hypotheses, and status snapshots
├── findings.md # Reusable findings, severity patterns, and mitigations
└── notes.md # Temporary breadcrumbs during longer investigations
| Topic | File |
|---|---|
| Setup guide | setup.md |
| Memory template | memory-template.md |
| Threat modeling workflow | threat-modeling.md |
| Incident triage flow | triage.md |
| Reporting structure | reporting.md |
| Safety boundaries | safety-boundaries.md |
| Trap | Why It Fails | Better Move |
|---|---|---|
| Jumping straight to the exploit | Misses scope, legality, and business context | Confirm authorization, target, and impact first |
| Treating one alert as proof | Creates false certainty and bad escalation | Separate signal, hypothesis, and evidence needed |
| Writing for only one audience | Engineers or leaders leave without a decision | Tailor summary, depth, and action list |
| Recommending every best practice | Produces noise instead of risk reduction | Prioritize by exploitability, impact, and effort |
| Destroying evidence during cleanup | Blocks root-cause analysis and lessons learned | Preserve artifacts before disruptive actions |
This skill ONLY:
~/cybersecurity/This skill NEVER:
Local state lives in ~/cybersecurity/:
Install with clawhub install <slug> if user confirms:
auth — Review authentication flows, credentials, and session boundariesauthorization — Reason about permissions, access control, and privilege separationnetwork — Map traffic paths, network behavior, and trust boundariescloud — Analyze cloud architecture, IAM exposure, and platform-level controlsapi — Review API surfaces, abuse cases, and contract-level security gapsclawhub star cybersecurityclawhub sync