Disaster Risk Assessment
v1.0.0Use when you need to assess disaster risk for a system or organization, perform structured risk analysis before disaster planning, identify which disasters t...
⭐ 0· 94·0 current·0 all-time
byHung Quoc To@quochungto
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, and required artifacts (none) align: this is a guidance/checklist skill for producing a quantitative risk register and does not require external services, binaries, or credentials.
Instruction Scope
SKILL.md contains step-by-step guidance for gathering system inventory, geographic context, scoring P×I, and building a register — all within the declared scope and without instructions to read unrelated files or exfiltrate data.
Install Mechanism
No install spec and no code files (instruction-only) — nothing is downloaded or written to disk, which is appropriate for a procedural guidance skill.
Credentials
The skill declares no environment variables, credentials, or config paths and the instructions do not request any secrets — credential requests would be unnecessary for the stated purpose.
Persistence & Privilege
always is false and autonomous invocation is not disabled (the platform default). There is no request to persist configuration or modify other skills; privileges are proportional to an instruction-only skill.
Assessment
This skill is a reusable, procedural checklist for disaster risk scoring and appears internally consistent. Things to consider before installing: (1) provenance — the skill has no homepage or known owner, so prefer installing only from trusted sources or reviewing content (you already have the full SKILL.md). (2) It requires you to supply sensitive system inventories and site-specific details when used — avoid pasting secrets, credentials, or private configuration into the agent unless you trust the environment. (3) Because it is instruction-only, it will not access your system on its own, but if you allow autonomous invocation, the agent could prompt you for data; limit that or review prompts manually. If you need stronger guarantees, ask for a skill with a known publisher or one that operates entirely offline within your org.Like a lobster shell, security has layers — review code before you run it.
bookforgevk97212jsh5qetj2s631cqfgv2s84hd0fdisaster-planningvk97212jsh5qetj2s631cqfgv2s84hd0fincident-readinessvk97212jsh5qetj2s631cqfgv2s84hd0flatestvk97212jsh5qetj2s631cqfgv2s84hd0freliabilityvk97212jsh5qetj2s631cqfgv2s84hd0frisk-assessmentvk97212jsh5qetj2s631cqfgv2s84hd0fsecurityvk97212jsh5qetj2s631cqfgv2s84hd0f
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
