Install
openclaw skills install ot-security-posture-scorecardAssess OT/ICS/SCADA security posture and generate risk scorecards with remediation guidance. Use when evaluating operational technology security, industrial control system risks, SCADA vulnerabilities, OT-IT convergence gaps, IEC 62443 compliance, or NIST CSF alignment for critical infrastructure.
openclaw skills install ot-security-posture-scorecardAssess the security posture of Operational Technology (OT), Industrial Control Systems (ICS), and SCADA environments. Returns a detailed scorecard with risk ratings, gap analysis, and prioritized remediation steps aligned to IEC 62443 and NIST CSF frameworks.
Built by a CISSP/CISM certified security professional at ToolWeb.in
TOOLWEB_API_KEY — Get your API key from portal.toolweb.incurl must be available on the systemPOST https://portal.toolweb.in:8443/security/itotassessor
Gather inputs from the user. Ask for the following:
Required fields:
org_name — Name of the organization (e.g., "Acme Manufacturing Corp")sector — Industry sector (e.g., "Manufacturing", "Energy", "Water Treatment", "Oil & Gas", "Pharmaceuticals", "Transportation", "Mining")ot_size — Size of OT environment (e.g., "Small", "Medium", "Large", "Enterprise")integration_level — Level of IT/OT integration (e.g., "Minimal", "Partial", "Full", "Air-Gapped")csf_scores — NIST CSF self-assessment scores (each 1-5). Ask the user to rate their maturity in each area:
identify — Asset management, risk assessment (1=none, 5=optimized)protect — Access control, security training, data protection (1=none, 5=optimized)detect — Monitoring, detection processes (1=none, 5=optimized)respond — Incident response planning and execution (1=none, 5=optimized)recover — Recovery planning and improvements (1=none, 5=optimized)Optional fields (use if the user provides them):
ot_technologies — List of OT technologies in use (e.g., ["SCADA", "PLC", "HMI", "DCS", "RTU"])it_tools — List of IT security tools in use (e.g., ["Firewall", "SIEM", "IDS", "EDR"])threat_concern — Primary threat concerns (e.g., "Ransomware targeting OT networks")compliance — Target compliance framework (e.g., "IEC 62443", "NIST CSF", "NERC CIP")known_gaps — Known security gaps (e.g., "No OT network monitoring, shared credentials on PLCs")team_maturity — Security team maturity level (e.g., "No dedicated OT security team")assessment_depth — Level of detail: "standard" (default) or "detailed"Call the API with the gathered parameters:
curl -s -X POST "https://portal.toolweb.in:8443/security/itotassessor" \
-H "Content-Type: application/json" \
-H "X-API-Key: $TOOLWEB_API_KEY" \
-d '{
"org_name": "<org_name>",
"sector": "<sector>",
"ot_size": "<ot_size>",
"integration_level": "<integration_level>",
"ot_technologies": ["<tech1>", "<tech2>"],
"it_tools": ["<tool1>", "<tool2>"],
"csf_scores": {
"identify": <1-5>,
"protect": <1-5>,
"detect": <1-5>,
"respond": <1-5>,
"recover": <1-5>
},
"threat_concern": "<threat_concern>",
"compliance": "<compliance>"
}'
Parse the response. The API returns a JSON object with:
status — "success" or error statusreport — Full markdown report containing executive summary, NIST CSF function analysis, top 5 priority risks, technology stack assessment, and step-by-step remediation roadmapoverall_score — Numeric score (0-100)csf_avg — Average CSF score across all 5 functionsrisk_level — Risk rating ("Critical", "High", "Medium", "Low")org_name — Organization name echoed backPresent results to the user in a clear, structured format:
Present the scorecard as follows:
🏭 OT/IT Convergence Security Assessment
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Organization: [org_name]
Sector: [sector]
Overall Score: [overall_score]/100 — [risk_level]
CSF Average: [csf_avg]/5.0
[Extract and present key sections from the report field:]
- Executive Summary
- Top 5 Priority Risks (with severity)
- Phase 1 Quick Wins (0-30 days)
- Recommended Technology Additions
📎 Full detailed report available — ask me to show any section
Note: The report field contains a comprehensive markdown report. Present the most actionable sections first (executive summary, top risks, quick wins) and offer to show the full report or specific sections on request.
TOOLWEB_API_KEY is not set: Tell the user to get an API key from https://portal.toolweb.in (plans start at ₹2,999/month or ~$36/month)apt install curl / brew install curl)User: "Assess the security of our water treatment plant's SCADA system"
Agent flow:
curl -s -X POST "https://portal.toolweb.in:8443/security/itotassessor" \
-H "Content-Type: application/json" \
-H "X-API-Key: $TOOLWEB_API_KEY" \
-d '{
"org_name": "WaterCo Utilities",
"sector": "Water Treatment",
"ot_size": "Medium",
"integration_level": "Partial",
"ot_technologies": ["SCADA", "PLC", "HMI"],
"csf_scores": {"identify":3,"protect":2,"detect":2,"respond":1,"recover":1}
}'
##About
Created by ToolWeb.in — a security-focused MicroSaaS platform with 200+ security APIs, built by a CISSP & CISM certified professional. Trusted by security teams in USA, UK, and Europe and we have platforms for "Pay-per-run", "API Gateway", "MCP Server", "OpenClaw", "RapidAPI" for execution and YouTube channel for demos.