Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

ISO 27001 Policy Generator

v1.0.0

Generate customized ISO 27001:2022 aligned information security policy documents based on your company's profile, infrastructure, and compliance needs.

0· 206·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for krishnakumarmahadevan-cmd/toolweb-iso27001-policy-generator.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "ISO 27001 Policy Generator" (krishnakumarmahadevan-cmd/toolweb-iso27001-policy-generator) from ClawHub.
Skill page: https://clawhub.ai/krishnakumarmahadevan-cmd/toolweb-iso27001-policy-generator
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install toolweb-iso27001-policy-generator

ClawHub CLI

Package manager switcher

npx clawhub@latest install toolweb-iso27001-policy-generator
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name and description (ISO 27001 policy generator) match the SKILL.md usage and example outputs. However, the SKILL.md documents an external hosted API (https://portal.toolweb.in/...) as the service that actually performs generation; the skill metadata does not disclose that it relies on an external service or list the required API credential.
!
Instruction Scope
The instructions expect the agent to POST full organization profiles (company name, infrastructure, data types, locations, etc.) to an external endpoint. That means potentially sensitive PII and security posture data would be transmitted off-host. The SKILL.md requires all input fields and shows how to authenticate, so data exfiltration to a third party is an implicit behavior that is not highlighted in metadata or provenance.
Install Mechanism
Instruction-only skill with no install steps or code files — nothing is written to disk or installed, which reduces supply-chain risk.
!
Credentials
The API reference requires an API key (X-API-Key or mcp_api_key) but the skill's declared requirements list no environment variables or primary credential. That omission is an inconsistency: a credential is needed by the API but is not declared in metadata, and the SKILL.md does not explain how the key is to be provided safely. Additionally, the skill requests highly sensitive organization data which is disproportionate unless you trust the external service.
Persistence & Privilege
Flags such as always:false and default invocation settings are normal. The skill does not request persistent system privileges or to modify other skills; no unusual persistence or privilege escalation is requested.
What to consider before installing
This skill appears to be a front-end for a hosted policy-generation API (portal.toolweb.in) and would send detailed organizational data to that external service. Before installing or using it: (1) Confirm the provider's identity, privacy policy, and data handling/security practices; (2) Ask why the API key requirement is not declared in the skill metadata and how the key will be supplied and stored; (3) Do not submit real PII or sensitive security posture data in initial tests — try non-sensitive sample inputs first; (4) Prefer a local/offline generator if you must keep data in-house; (5) If you proceed, create a limited-scope/test API key and monitor outbound requests; (6) If uncertain about trustworthiness, decline or require source code/auditable implementation that does generation locally rather than posting your data to an unknown third party.

Like a lobster shell, security has layers — review code before you run it.

latestvk97cknar3hj4s751b6bfyk9jss8379b0
206downloads
0stars
1versions
Updated 1h ago
v1.0.0
MIT-0

ISO 27001 Policy Generator

Generate tailored ISO 27001 information security policies for your organization. Provide your company profile, infrastructure context, and compliance requirements — get back a complete set of ready-to-use policy documents aligned to ISO/IEC 27001:2022 controls. Covers all Annex A domains including access control, cryptography, supplier relationships, incident management, and more.


Usage

{
  "tool": "iso27001_policy_generator",
  "input": {
    "company_name": "Vertex Technologies Pvt Ltd",
    "company_size": "Medium",
    "industry": "Financial Services",
    "country": "India",
    "has_existing_policies": false,
    "policy_types": [
      "Information Security Policy",
      "Access Control Policy",
      "Acceptable Use Policy",
      "Incident Response Policy",
      "Data Classification Policy"
    ],
    "compliance_requirements": ["ISO 27001", "RBI Guidelines", "GDPR"],
    "business_locations": ["Mumbai", "Bangalore", "Singapore"],
    "it_infrastructure": ["On-premise Servers", "AWS Cloud", "SaaS Applications", "VPN"],
    "data_types": ["Customer PII", "Financial Records", "Employee Data", "Intellectual Property"],
    "third_party_vendors": true,
    "remote_work": true,
    "cloud_services": true,
    "mobile_devices": true,
    "data_retention_years": 7
  }
}

Parameters

All fields are required.

Company Profile

FieldTypeDescription
company_namestringName of the organization
company_sizestringSmall, Medium, Large, Enterprise
industrystringIndustry vertical (e.g., Financial Services, Healthcare, Technology, Retail)
countrystringPrimary country of operation
has_existing_policiesbooleanWhether the organization already has some security policies in place
data_retention_yearsintegerNumber of years data must be retained per regulatory/business requirement

Policy Scope

FieldTypeDescription
policy_typesarray of stringsSpecific policies to generate. Examples: Information Security Policy, Access Control Policy, Acceptable Use Policy, Cryptography Policy, Incident Response Policy, Business Continuity Policy, Supplier Security Policy, Data Classification Policy, Change Management Policy, Physical Security Policy
compliance_requirementsarray of stringsRegulations/frameworks to align with. Examples: ISO 27001, GDPR, SOC 2, PCI DSS, HIPAA, RBI Guidelines, SEBI
business_locationsarray of stringsCities/countries where the organization operates

Infrastructure Context

FieldTypeDescription
it_infrastructurearray of stringsInfrastructure components in use. Examples: On-premise Servers, AWS Cloud, Azure, GCP, SaaS Applications, VPN, Active Directory, Kubernetes
data_typesarray of stringsTypes of data handled. Examples: Customer PII, Financial Records, Employee Data, Health Records, Intellectual Property, Source Code
third_party_vendorsbooleanWhether third-party vendors have access to systems or data
remote_workbooleanWhether remote/hybrid work is practised
cloud_servicesbooleanWhether cloud services are used
mobile_devicesbooleanWhether mobile devices are used to access company systems or data

What You Get

  • Complete policy documents — fully drafted, organization-specific ISO 27001 policies ready for review and adoption
  • Annex A control mapping — each policy mapped to relevant ISO 27001:2022 Annex A controls
  • Multi-framework alignment — policies cross-referenced with your stated compliance requirements (GDPR, PCI DSS, SOC 2, etc.)
  • Scope and applicability statements — tailored to your infrastructure, locations, and workforce model
  • Review and approval guidance — suggested review cycles, ownership assignments, and version control notes
  • Implementation checklist — step-by-step actions to operationalize each policy

Example Output

{
  "organization": "Vertex Technologies Pvt Ltd",
  "policies_generated": 5,
  "iso27001_version": "ISO/IEC 27001:2022",
  "policies": [
    {
      "title": "Information Security Policy",
      "annex_a_controls": ["5.1", "5.2", "5.3"],
      "compliance_alignment": ["ISO 27001", "GDPR Article 32"],
      "sections": [
        "Purpose and Scope",
        "Management Commitment",
        "Roles and Responsibilities",
        "Policy Statements",
        "Enforcement and Review"
      ],
      "review_cycle": "Annual",
      "owner": "Chief Information Security Officer"
    },
    {
      "title": "Access Control Policy",
      "annex_a_controls": ["8.2", "8.3", "8.4", "8.5", "8.6"],
      "compliance_alignment": ["ISO 27001", "RBI Guidelines", "GDPR"],
      "sections": [
        "Access Request and Approval",
        "Privileged Access Management",
        "Password Requirements",
        "Remote Access Controls",
        "Access Review and Revocation"
      ],
      "review_cycle": "Annual",
      "owner": "IT Security Manager"
    }
  ],
  "implementation_checklist": [
    "Assign policy owners for each document",
    "Schedule management review and sign-off",
    "Publish to internal knowledge base/intranet",
    "Conduct workforce awareness training",
    "Set calendar reminders for annual review"
  ]
}

API Reference

Base URL: https://portal.toolweb.in/apis/compliance/iso27001-policy

EndpointMethodDescription
/iso27001-policiesPOSTGenerate ISO 27001 policy documents

Authentication: Pass your API key as X-API-Key header or mcp_api_key argument via MCP.


Pricing

PlanDaily LimitMonthly LimitPrice
Free5 / day50 / month$0
Developer20 / day500 / month$39
Professional200 / day5,000 / month$99
Enterprise100,000 / day1,000,000 / month$299

About

ToolWeb.in — 200+ security APIs, CISSP & CISM certified, built for enterprise compliance practitioners.

Platforms: Pay-per-run · API Gateway · MCP Server · OpenClaw · RapidAPI · YouTube

Comments

Loading comments...