Data Breach Response
Analysis
The skill appears purpose-aligned for generating breach response plans, but users should be aware it sends organization and security posture details to an API from an unknown-provenance source.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Source: unknown; Homepage: none
The registry metadata does not provide a source repository or homepage, limiting the user’s ability to verify the provider or service provenance.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
"companyName", "industry", "companySize", "dataTypes", "existingTools", "compliance", "sessionId"
The plan-generation request schema includes organization identity, handled data types, deployed security tools, compliance obligations, and session identifiers, which would be sent to the API to generate the playbook.
