Vendor Risk Assessment

v1.0.0

Evaluate and score vendors on security, financials, compliance, operations, and data handling to classify risk and manage remediation plans effectively.

0· 486·0 current·0 all-time
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (vendor risk assessment) matches the SKILL.md content: scoring rubric, portfolio view, templates, and red‑flags. There are no unexpected binaries, credentials, or system config requirements for this stated purpose.
Instruction Scope
The SKILL.md stays within the assessment domain (scoring, review templates, remediation actions). It includes external links to paid playbooks and an 'Agent Setup Wizard' URL — these are outside the skill but are only links. The skill itself does not instruct the agent to read local files, environment variables, or to transmit data to remote endpoints, but you should vet those external sites before following them.
Install Mechanism
Instruction-only skill with no install spec and no code files. This is low risk because nothing is written to disk or executed by the skill itself.
Credentials
No environment variables, credentials, or config paths are requested. The lack of secret or cloud credential requests is appropriate for a guidance/playbook skill.
Persistence & Privilege
Defaults are used (always:false, agent invocation allowed). The skill does not request permanent presence or elevated privileges and does not attempt to modify other skills or system settings.
Assessment
This skill appears coherent and safe as a playbook: it only contains assessment guidance and templates and does not request credentials or install anything. Before using, review any external links (the playbook and agent‑setup URLs) in a browser to confirm they are trustworthy and avoid pasting sensitive credentials into third‑party sites. If you plan to automate vendor assessments, sandbox any agent workflows that will handle vendor data and ensure they do not forward sensitive information to unknown endpoints.

Like a lobster shell, security has layers — review code before you run it.

auditvk97dr1dgs3b2j2wkt9am7zfys181gwx7compliancevk97dr1dgs3b2j2wkt9am7zfys181gwx7latestvk97dr1dgs3b2j2wkt9am7zfys181gwx7procurementvk97dr1dgs3b2j2wkt9am7zfys181gwx7riskvk97dr1dgs3b2j2wkt9am7zfys181gwx7securityvk97dr1dgs3b2j2wkt9am7zfys181gwx7vendorvk97dr1dgs3b2j2wkt9am7zfys181gwx7
486downloads
0stars
1versions
Updated 1mo ago
v1.0.0
MIT-0

Vendor Risk Assessment

Score and manage third-party vendor risk across security, financial stability, compliance, operational dependency, and data handling. Built for procurement teams, CISOs, and operations leaders managing 10+ vendors.

Usage

Run this assessment for each critical vendor. Aggregate scores into a portfolio risk view.

Assessment Framework

1. Vendor Risk Scorecard (5 Domains, 0-100 each)

Security Posture (0-100)

  • SOC 2 Type II current? (+20)
  • Penetration test within 12 months? (+15)
  • Incident response plan documented? (+15)
  • Data encryption at rest and transit? (+15)
  • MFA enforced for all access? (+10)
  • Security questionnaire completed? (+10)
  • Subprocessor list disclosed? (+15)

Financial Stability (0-100)

  • Revenue trend (growing +25, flat +10, declining 0)
  • Funding runway >18 months? (+20)
  • Customer concentration <20%? (+15)
  • Public financials or audited statements? (+15)
  • No material litigation? (+15)
  • Credit rating acceptable? (+10)

Compliance & Regulatory (0-100)

  • Industry certifications current? (+20)
  • GDPR/CCPA compliant? (+20)
  • Data processing agreement signed? (+15)
  • Regulatory audit history clean? (+15)
  • Right to audit clause? (+15)
  • Data residency requirements met? (+15)

Operational Dependency (0-100)

  • SLA with financial penalties? (+20)
  • Uptime >99.9% trailing 12 months? (+20)
  • Disaster recovery tested annually? (+15)
  • Single point of failure for your business? (-20)
  • Migration plan documented? (+15)
  • API/export capability? (+15)
  • Vendor lock-in risk assessment? (+15)

Data Handling (0-100)

  • Data classification documented? (+20)
  • Retention/deletion policies clear? (+20)
  • Breach notification <72 hours? (+20)
  • Data portability guaranteed? (+15)
  • AI/ML training on your data? (opt-out available +15, no opt-out -10)
  • Access logging and audit trail? (+10)

2. Risk Tier Classification

Aggregate ScoreTierReview CadenceAction
400-500Low RiskAnnualStandard monitoring
300-399ModerateSemi-annualRemediation plan required
200-299High RiskQuarterlyExecutive escalation, alternatives identified
0-199CriticalMonthlyExit plan required within 90 days

3. Portfolio Risk View

Total vendors: ___
Critical tier: ___ (target: 0)
High risk: ___ (target: <10%)
Moderate: ___ (target: <30%)
Low risk: ___ (target: >60%)

Top 3 concentration risks:
1. [Vendor] — [function] — [% of operations dependent]
2. [Vendor] — [function] — [% of operations dependent]
3. [Vendor] — [function] — [% of operations dependent]

Annual vendor spend: $___
Spend on high/critical vendors: $___  (___%)

4. Cost of Vendor Failure

Impact AreaCalculation
Revenue lossDaily revenue × expected downtime days
Recovery costMigration estimate + emergency procurement
Compliance penaltyRegulatory fine range for data breach via vendor
Reputation damageCustomer churn rate × LTV × affected customers
Operational disruptionStaff idle cost × recovery period

5. Quarterly Review Template

  • Score changes since last review (flag any >10 point drops)
  • New subprocessors added by vendor
  • SLA performance vs target
  • Security incidents or near-misses
  • Contract renewal timeline and negotiation leverage
  • Alternative vendor benchmarking

6. Red Flags (Immediate Action)

  • Vendor acquired by competitor
  • Key personnel departures (CISO, CTO)
  • Downtime exceeding SLA 2+ months
  • Regulatory action or investigation
  • Refusal to complete security questionnaire
  • Data breach affecting other customers
  • Sudden pricing changes >20%

Industry-Specific Vendor Risks

IndustryCritical Vendor CategorySpecific Risk
HealthcareEHR, billing, telehealthHIPAA BAA gaps, PHI exposure
Financial ServicesCore banking, payments, KYCPCI DSS, regulatory reporting
LegalCase management, ediscoveryPrivilege breach, client data
SaaSInfrastructure, auth, paymentsCascading outages, PII
ManufacturingMES, supply chain, IoTIP theft, production stoppage
ConstructionProject management, safetyCompliance documentation gaps
EcommercePayments, fulfillment, CDNPCI, availability during peak
RecruitmentATS, background check, payrollCandidate PII, bias in AI screening
Real EstateMLS, transaction mgmt, titleWire fraud, closing delays
Professional ServicesCRM, billing, document mgmtClient confidentiality breach

Get the Full Playbook

Comments

Loading comments...