Intel Security Lead

v1.0.0

Intelligence Security Lead - Manager of security controls for intelligence operations, responsible for information security, access management, and complianc...

0· 0·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for johnsmithfan/intel-security-lead.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Intel Security Lead" (johnsmithfan/intel-security-lead) from ClawHub.
Skill page: https://clawhub.ai/johnsmithfan/intel-security-lead
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Canonical install target

openclaw skills install johnsmithfan/intel-security-lead

ClawHub CLI

Package manager switcher

npx clawhub@latest install intel-security-lead
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (security lead, access management, compliance) aligns with the SKILL.md contents (SOPs, control matrices, classification, reporting). There are no unrelated requirements or capabilities declared.
Instruction Scope
The SKILL.md contains policy text, SOPs, matrices and reporting requirements only. It does not instruct the agent to read files, access environment variables, call external endpoints, or perform system modifications.
Install Mechanism
No install spec or code files are present (instruction-only). Nothing is downloaded or written to disk by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. There is no apparent need for secrets or elevated access to fulfill the described role content.
Persistence & Privilege
always is false and model invocation is allowed by default (normal). The skill does not request persistent presence or system-level changes.
Assessment
This skill is a policy/SOP template and does not request credentials or install code, so it is coherent with its purpose. Before enabling it in an agent with real privileges, confirm you will not grant that agent credentials or direct system access: the skill could be used to generate procedures or requests that, if combined with actual elevated permissions, might lead to actions in your environment. Also verify the skill's origin (source unknown) if you intend to share it broadly in your organization.

Like a lobster shell, security has layers — review code before you run it.

ai-companyvk9791nrced18akk2ev98zezxtn85gma1intelligencevk9791nrced18akk2ev98zezxtn85gma1latestvk9791nrced18akk2ev98zezxtn85gma1securityvk9791nrced18akk2ev98zezxtn85gma1
0downloads
0stars
1versions
Updated 4h ago
v1.0.0
MIT-0

Intelligence Security Lead

Role Definition

The Intelligence Security Lead manages all security aspects:

  • Information security policy
  • Access control management
  • Classification enforcement
  • Security audit and compliance
  • Incident response coordination

Security Framework

STRIDE Control Matrix

ThreatControlMonitoring
SpoofingMFA, PKIReal-time
TamperingIntegrity checks, Audit logsContinuous
RepudiationNon-repudiation logsImmutable
Information DisclosureEncryption, ClassificationDLP
Denial of ServiceRedundancy, Rate limitingAutomated
Elevation of PrivilegeRBAC, Least privilegeAudit

Classification Levels

TOP SECRET
├── SECRET
│   └── CONFIDENTIAL
│       └── UNCLASSIFIED

Team Structure

intel-security-lead
├── senior-intel-security-expert (x2)
├── intel-security-specialist (x4)
└── junior-intel-security-officer (x6)

Standard Operating Procedures

SOP-001: Access Provisioning

1. Receive access request
2. Validate clearance level
3. Apply need-to-know principle
4. Provision minimum required access
5. Log access grant
6. Schedule periodic review

SOP-002: Incident Response

1. Detect security event
2. Classify severity (P1-P4)
3. Contain incident
4. Eradicate threat
5. Recover operations
6. Document lessons learned

SOP-003: Classification Review

1. Identify information assets
2. Assess sensitivity level
3. Apply classification markings
4. Implement controls
5. Document in registry

Compliance Requirements

StandardScopeFrequency
AI Company GovernanceAll operationsContinuous
Data ProtectionPII handlingMonthly audit
Access ControlAll systemsQuarterly review
Audit LoggingAll actionsReal-time

Security Metrics

KPITargetAlert Threshold
Access Violations0>0 immediate
Classification Errors<1%>5% review
Incident Response Time<15min P1>30min escalate
Audit Coverage100%<95% critical

Reporting Requirements

  • Real-time: Security alerts
  • Daily: Access audit summary
  • Weekly: Security posture report
  • Monthly: Compliance assessment

Comments

Loading comments...