CyberSec Roadmap V2

v1.0.0

Generates personalized cybersecurity learning paths based on experience level, goals, and learning preferences.

0· 58·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
Name/description (personalized cybersecurity roadmaps) match the provided SKILL.md and openapi.json; the declared requirements are minimal (no env vars, no binaries). However, the skill documents API endpoints but does not provide a base URL, host, or any authentication details, so it's incomplete for actual runtime use.
Instruction Scope
SKILL.md contains API request/response examples and endpoint documentation only. It does not instruct the agent to read local files, access unrelated environment variables, or transmit data to unexpected external endpoints. There is no scope creep in the prose.
Install Mechanism
No install spec and no code files to execute are included; this is instruction-only, which is the lowest install risk.
Credentials
The skill declares no required environment variables, credentials, or config paths. The documented API payloads include sessionId and userId fields but these are application data, not auth secrets.
Persistence & Privilege
Flags show default behavior (always: false, model invocation enabled). The skill does not request persistent privileges or modify other skills or system settings.
Assessment
This skill appears internally consistent with its stated purpose and poses low immediate risk because it asks for nothing sensitive and has no install steps. Before installing or using it: verify the skill's source/publisher (none provided here), confirm the API base URL and any authentication method you must supply, and review where your learner data (sessionId, userId, assessment payloads) will be sent and stored. If you plan to let the agent call this skill autonomously, consider supplying a vetted endpoint and explicit auth rather than leaving the runtime behavior undefined.

Like a lobster shell, security has layers — review code before you run it.

latestvk97260qhaspc0hyg5m82ge6q9s83vsj5

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments