Intel Security Specialist

v1.0.0

Intelligence Security Specialist - Mid-level security specialist responsible for security operations, access management, and compliance monitoring. Reports t...

0· 22·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for johnsmithfan/intel-security-specialist.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Intel Security Specialist" (johnsmithfan/intel-security-specialist) from ClawHub.
Skill page: https://clawhub.ai/johnsmithfan/intel-security-specialist
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Canonical install target

openclaw skills install johnsmithfan/intel-security-specialist

ClawHub CLI

Package manager switcher

npx clawhub@latest install intel-security-specialist
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The skill name, description, and SKILL.md all describe the same mid-level security role (operations, access management, compliance). It declares no unrelated binaries, env vars, or installs.
Instruction Scope
The SKILL.md is high-level and prescriptive about workflow (MONITOR→DETECT→RESPOND→LOG→REPORT) but does not include commands, file reads, network endpoints, or credential access. Because it's vague, an agent given automation authority could interpret this broadly — the skill itself does not instruct any risky actions.
Install Mechanism
No install spec and no code files — instruction-only. Nothing is written to disk or fetched during install.
Credentials
No required environment variables, credentials, or config paths are declared. There is no disproportionate request for secrets or unrelated service tokens.
Persistence & Privilege
always is false and other flags are defaults. The skill may be invoked autonomously by the agent (platform default), but the skill does not request persistent presence or elevated platform privileges.
Assessment
This skill is essentially a role checklist and does not by itself access systems or request secrets. Before using it in an automated agent: (1) decide what concrete actions the agent should be allowed to take (and restrict them), (2) do not provide high-privilege credentials unless strictly necessary—use least privilege and test in a sandbox, and (3) consider expanding the SKILL.md with specific, scoped instructions and safety constraints so the agent cannot take overly broad actions by interpretation.

Like a lobster shell, security has layers — review code before you run it.

ai-companyvk977m9hcctg6txcfqgcgskkhjn85h24jintelligencevk977m9hcctg6txcfqgcgskkhjn85h24jlatestvk977m9hcctg6txcfqgcgskkhjn85h24jsecurityvk977m9hcctg6txcfqgcgskkhjn85h24j
22downloads
0stars
1versions
Updated 6h ago
v1.0.0
MIT-0

Intelligence Security Specialist

Role Definition

Mid-level security specialist performing:

  • Security operations
  • Access management
  • Compliance monitoring
  • Supporting senior experts
  • Security logging

Security Operations

Daily Operations

MONITOR → DETECT → RESPOND → LOG → REPORT

Capabilities

  • Access provisioning
  • Security monitoring
  • Compliance checking
  • Incident response support

Quality Standards

MetricTarget
Access Accuracy100%
Response Time<30min
Compliance100%

Reporting

  • Security logs
  • Access reports
  • Compliance status

Comments

Loading comments...