Cyber Kill Chain

v1.0.0

Enterprise-grade cybersecurity framework assessment platform that evaluates organizational security controls across the kill chain spectrum.

0· 130·0 current·0 all-time
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, SKILL.md and openapi.json consistently describe an assessment API for mapping controls to kill-chain stages. There are no unexpected environment variables, binaries, or config paths requested that would be unrelated to an assessment tool.
Instruction Scope
SKILL.md contains API documentation, sample requests/responses, and endpoint descriptions only. It does not instruct the agent to read local files, access system state, harvest environment variables, or send data to unrelated endpoints.
Install Mechanism
No install spec and no code files beyond documentation (instruction-only). Nothing is written to disk or downloaded by an installer; this is the lowest-risk install posture.
Credentials
The skill declares no required environment variables, credentials, or config paths. That is proportionate for a documentation/ API-definition-only skill.
Persistence & Privilege
Flags show always:false (not forced), user-invocable, and normal autonomous invocation allowed. The skill does not request persistent system-level presence or modify other skills/configuration.
Assessment
This skill appears internally consistent and low-risk as delivered (documentation + OpenAPI). Before installing or sending real assessment data, verify the service provider (the package lists toolweb.in links but no official homepage), confirm the actual endpoint/host you will be calling, and avoid submitting sensitive production data until you’ve validated data handling, retention, and access controls. If you need stronger assurance, request an official SDK/hosted endpoint, TLS assurances, and a privacy/SLA statement from the provider.

Like a lobster shell, security has layers — review code before you run it.

latestvk978ajfmdbggkz9tgbh9zpc4c983ezkg
130downloads
0stars
1versions
Updated 3w ago
v1.0.0
MIT-0

Overview

The Cyber Kill Chain Security Assessment platform is an enterprise-grade tool designed to systematically evaluate organizational security posture across multiple stages of the MITRE ATT&CK kill chain framework. This API enables security teams to document control implementation status, measure compliance gaps, and generate comprehensive security assessments tailored to organizational risk profiles.

Built for security professionals, compliance officers, and enterprise risk managers, this platform transforms control validation into actionable security intelligence. By mapping security controls to kill chain stages, organizations gain visibility into defense effectiveness and can prioritize remediation efforts based on attack vector coverage.

The assessment engine supports three operational tiers—basic, standard, and enterprise—accommodating organizations from small teams to large multi-division enterprises. Each tier provides proportionate depth of analysis, enabling right-sized security assessment without unnecessary complexity.

Usage

Sample Request

{
  "tier": "standard",
  "sessionId": "ckc-2024-q1-audit-001",
  "controls": {
    "reconnaissance": [
      {
        "controlId": "RECON-001",
        "compliant": true,
        "notes": "OSINT monitoring active via threat intelligence platform"
      },
      {
        "controlId": "RECON-002",
        "compliant": false,
        "notes": "Domain registration monitoring not yet implemented"
      }
    ],
    "weaponization": [
      {
        "controlId": "WEAPON-001",
        "compliant": true,
        "notes": "Email gateway sandboxing enabled with 48-hour detonation window"
      }
    ],
    "delivery": [
      {
        "controlId": "DELIVERY-001",
        "compliant": true,
        "notes": "Advanced email filtering with machine learning enabled"
      },
      {
        "controlId": "DELIVERY-002",
        "compliant": false,
        "notes": "USB device policy enforcement pending endpoint refresh"
      }
    ]
  }
}

Sample Response

{
  "assessmentId": "ckc-2024-q1-audit-001",
  "tier": "standard",
  "timestamp": "2024-01-15T10:30:00Z",
  "overallScore": 72,
  "complianceRate": 0.78,
  "stageBreakdown": {
    "reconnaissance": {
      "score": 50,
      "compliant": 1,
      "total": 2,
      "gaps": [
        "Domain registration monitoring"
      ]
    },
    "weaponization": {
      "score": 100,
      "compliant": 1,
      "total": 1,
      "gaps": []
    },
    "delivery": {
      "score": 75,
      "compliant": 2,
      "total": 3,
      "gaps": [
        "USB device policy enforcement"
      ]
    }
  },
  "recommendations": [
    {
      "stage": "reconnaissance",
      "priority": "high",
      "action": "Implement domain registration monitoring service"
    },
    {
      "stage": "delivery",
      "priority": "medium",
      "action": "Accelerate endpoint policy enforcement rollout"
    }
  ],
  "nextReviewDate": "2024-04-15"
}

Endpoints

GET /health

Description: Health check endpoint for service availability verification.

Parameters: None

Response:

  • Status Code: 200
  • Content-Type: application/json
  • Body: JSON object confirming service health status

POST /api/security/assess

Description: Perform comprehensive Cyber Kill Chain security assessment across specified control domains and kill chain stages.

Parameters:

NameTypeRequiredDescription
tierstringYesAssessment tier level: basic, standard, or enterprise. Determines scope and depth of analysis.
sessionIdstringYesUnique session identifier for audit trail and assessment tracking. Recommended format: ckc-YYYY-MM-QX-description.
controlsobjectYesKill chain stage controls indexed by stage name. Each stage contains array of control assessments.
controls[stage]arrayYesArray of control assessments for a specific kill chain stage (e.g., reconnaissance, weaponization, delivery).
controlIdstringYesUnique identifier for the security control being assessed.
compliantbooleanYesCompliance status: true if control is implemented and operational, false if non-compliant.
notesstringOptionalContextual notes, implementation details, or remediation timeline. Maximum 500 characters recommended.

Response:

  • Status Code: 200
  • Content-Type: application/json
  • Body: Assessment results including overall score, stage-by-stage breakdown, compliance rate, identified gaps, and remediation recommendations.

Error Responses:

  • Status Code: 422
  • Description: Validation error. Request failed schema validation (missing required fields, invalid tier value, malformed control structure).
  • Content-Type: application/json
  • Body: Validation error details with field locations and error messages.

OPTIONS /api/security/assess

Description: CORS preflight request handler for cross-origin assessment submissions.

Parameters: None

Response:

  • Status Code: 200
  • Content-Type: application/json
  • Body: CORS headers configuration confirming allowed methods and origins.

Pricing

PlanCalls/DayCalls/MonthPrice
Free550Free
Developer20500$39/mo
Professional2005,000$99/mo
Enterprise100,0001,000,000$299/mo

About

ToolWeb.in - 200+ security APIs, CISSP & CISM, platforms: Pay-per-run, API Gateway, MCP Server, OpenClaw, RapidAPI, YouTube.

References

Comments

Loading comments...