Intel Security

v2.0.1

Intelligence Security Operations - Unified skill covering all security tiers (lead, senior, mid, junior). Manages information security policy, STRIDE threat...

0· 0·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for johnsmithfan/intel-security.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Intel Security" (johnsmithfan/intel-security) from ClawHub.
Skill page: https://clawhub.ai/johnsmithfan/intel-security
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Canonical install target

openclaw skills install johnsmithfan/intel-security

ClawHub CLI

Package manager switcher

npx clawhub@latest install intel-security
Security Scan
Capability signals
Requires sensitive credentials
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description describe security operations, and all included files (SOPs, templates, and human-facing prompts) match that purpose — there are no unrelated requirements (no credentials, binaries, or external services).
Instruction Scope
SKILL.md and the included prompt/SOP files contain guidance, templates, and manual copy/paste prompts intended for human use; they do not instruct the agent to read local files, fetch external endpoints, or access credentials. The prompts explicitly state they are for manual use, not automatic invocation.
Install Mechanism
No install spec and no code files — nothing is written to disk or downloaded during install. This is the lowest-risk install profile.
Credentials
The skill declares no required environment variables, credentials, or config paths. The content does not reference accessing secrets or external tokens, so requested privileges are proportional to the stated purpose.
Persistence & Privilege
always is false and default autonomy settings apply; the skill does not request elevated persistence or modify other skills/configurations. It is user-invocable and can be invoked by the agent normally, which is expected for skills.
Assessment
This skill is essentially a library of security SOPs and human-facing prompts and is internally consistent with its stated purpose. Because it is instruction-only and requests no credentials or installs, it cannot by itself exfiltrate secrets or execute code. Before installing, you should: (1) confirm the source/trustworthiness since metadata shows 'source: unknown' and no homepage, (2) review the SOPs for alignment with your organization's legal/compliance requirements (retention, classification rules, SLAs), (3) avoid granting the skill any special platform privileges beyond default invocation, and (4) if you plan to let agents act autonomously with these instructions, test in a non-production environment and ensure agents do not get access to real secrets or systems when following its guidance.

Like a lobster shell, security has layers — review code before you run it.

STRIDEvk973pp0jhvd4v0pqmb4nch289h85kq8tai-companyvk973pp0jhvd4v0pqmb4nch289h85kq8tcompliancevk973pp0jhvd4v0pqmb4nch289h85kq8tintelligencevk973pp0jhvd4v0pqmb4nch289h85kq8tlatestvk973pp0jhvd4v0pqmb4nch289h85kq8tsecurityvk973pp0jhvd4v0pqmb4nch289h85kq8tthreat-modelingvk973pp0jhvd4v0pqmb4nch289h85kq8t
0downloads
0stars
2versions
Updated 3h ago
v2.0.1
MIT-0

Intelligence Security Operations

Quick Reference

Role: All security operations across all tiers Reports to: intel-director Security clearance: TOP SECRET (lead), SECRET (senior), CONFIDENTIAL (mid), CONFIDENTIAL (junior)

Tier Authority

TierScopeAutonomyApproval Required For
LeadSecurity architecture, policyFullPolicy changes, tool procurement
SeniorAdvanced threat modeling, architecture reviewHighProduction security changes
MidRoutine security ops, access managementMediumAccess grants above CONFIDENTIAL
JuniorBasic security tasks, documentationSupervisedAll access actions reviewed

STRIDE Control Matrix

Threat VectorControlMonitoringTier Min
SpoofingMFA, PKI, certificate pinningReal-time alertsMid
TamperingIntegrity hashes, audit logs, signed artifactsContinuousMid
RepudiationNon-repudiation logs, digital signaturesImmutable auditSenior
Information DisclosureEncryption (at-rest + in-transit), DLP, classificationDLP scanningMid
Denial of ServiceRedundancy, rate limiting, circuit breakersAutomated health checksMid
Elevation of PrivilegeRBAC, least privilege, sandboxingPeriodic auditSenior

Classification Levels

TOP SECRET    → Permanent retention, restricted access
├── SECRET     → 25-year retention, limited access
│   └── CONFIDENTIAL → 10-year retention, standard access
│       └── UNCLASSIFIED → 5-year retention, open access

Incident Response SLA

PriorityDefinitionResponseContainment
P1Active breach, data exfiltration<5 min<30 min
P2Confirmed vulnerability exploitation<15 min<2h
P3Potential vulnerability, unconfirmed<1h<8h
P4Policy violation, non-critical<4h<24h

Defense in Depth Model

Perimeter Security (WAF, Firewall, DDoS protection)
├── Network Security (IDS/IPS, Network segmentation, VPN)
│   ├── Host Security (EDR, Hardening, Patch management)
│   │   ├── Application Security (SAST/DAST, WAF, Input validation)
│   │   │   └── Data Security (Encryption, Tokenization, Masking)

KPI Targets

MetricSeniorMidJunior
Security Posture Score>95%>90%>85%
Mean Time to Detect<1h<2hEscalate
Access Accuracy100%100%100%
Compliance Coverage100%100%Document

File Index

FilePurposeWhen to Read
references/method-patterns.mdDetailed security SOPs, STRIDE templates, incident response playbooks, access provisioning workflowsSecurity operations, threat modeling, incident handling
prompts/01-implement-method.mdUser-facing prompt for implementing security methodsManual copy-paste to external AI chat
prompts/02-robustness-checks.mdUser-facing prompt for verifying security robustnessManual copy-paste to external AI chat

Comments

Loading comments...