Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

NIST CSF Mapper

v1.0.0

Map your security controls and tools to NIST CSF 2.0, receive coverage scores, gap analysis, tier rating, regulatory crosswalk, and a prioritized improvement...

0· 197·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for krishnakumarmahadevan-cmd/toolweb-nist-csf-mapper.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "NIST CSF Mapper" (krishnakumarmahadevan-cmd/toolweb-nist-csf-mapper) from ClawHub.
Skill page: https://clawhub.ai/krishnakumarmahadevan-cmd/toolweb-nist-csf-mapper
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install toolweb-nist-csf-mapper

ClawHub CLI

Package manager switcher

npx clawhub@latest install toolweb-nist-csf-mapper
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The skill claims to call an external service (portal.toolweb.in) to generate NIST CSF mappings and expects an API key in its API reference, yet the skill metadata lists no required environment variables or primary credential. That omission is inconsistent: a remote API integration normally requires the caller to provide an API key or token.
Instruction Scope
SKILL.md is instruction-only and stays within the stated purpose: it asks for company profile, tools, boolean posture fields, and describes POSTing that data to /nist-mapping. It does not instruct reading local files, arbitrary env vars, or other system state. The instructions do send potentially sensitive organizational security data to an external endpoint.
Install Mechanism
There is no install spec and no code files; this is instruction-only, which minimizes on-disk installation risk.
!
Credentials
The API reference requires an API key via X-API-Key or mcp_api_key, but the skill metadata declares no required env vars/primary credential. That discrepancy means the skill's declared permissions understate the secret/API access it needs. Also, the skill will transmit detailed security posture data to an external endpoint — sensitive information that warrants explicit justification and documented handling.
Persistence & Privilege
The skill does not request always: true, does not modify other skills, and declares no config paths. It does allow autonomous invocation (default), but that is the platform norm and not by itself a problem.
What to consider before installing
This skill appears to be a thin wrapper around an external API (portal.toolweb.in) that will receive detailed information about your security posture. Before installing or using it: 1) Confirm the provider identity and homepage/source (metadata lists none). 2) Do not send production-sensitive or confidential data until you verify the vendor's security/privacy policies and TLS ownership. 3) Ask the publisher why no credential is declared in the metadata even though SKILL.md requires an API key; require that the skill declare a primary credential or prompt for it explicitly. 4) Test with synthetic or redacted data first. 5) If you must provide an API key, use least-privilege credentials and short-lived keys where possible and review audit logs for API use. 6) If you need an on‑premise or offline mapping for compliance reasons, prefer tools that run locally rather than outsourcing security posture data to an external service.

Like a lobster shell, security has layers — review code before you run it.

latestvk9756rgmz44nxcdkpsk27k36h1837wd3
197downloads
0stars
1versions
Updated 20h ago
v1.0.0
MIT-0

NIST CSF Mapper

Map your organization's current security controls and tooling to the NIST Cybersecurity Framework (CSF) 2.0. Provide your company profile, existing security tools, and control posture — get back a function-by-function CSF coverage report, gap analysis, maturity tier rating, and a prioritized improvement roadmap across all six CSF functions: Govern, Identify, Protect, Detect, Respond, and Recover.


Usage

{
  "tool": "nist_csf_mapper",
  "input": {
    "company_size": "Medium",
    "industry": "Financial Services",
    "current_tools": ["Palo Alto Firewall", "CrowdStrike EDR", "Splunk SIEM", "Tenable Nessus", "AWS Backup", "KnowBe4"],
    "has_firewall": true,
    "has_antivirus": true,
    "has_backup_system": true,
    "has_monitoring": true,
    "has_incident_response": false,
    "has_access_controls": true,
    "has_data_encryption": true,
    "has_vulnerability_scanning": true,
    "has_security_training": true,
    "has_business_continuity": false,
    "regulatory_requirements": ["PCI DSS", "GDPR", "RBI Guidelines"]
  }
}

Parameters

All fields are required.

Company Profile

FieldTypeDescription
company_sizestringSmall, Medium, Large, Enterprise
industrystringIndustry vertical (e.g., Financial Services, Healthcare, Manufacturing, Technology, Retail, Energy)
current_toolsarray of stringsSecurity tools currently deployed. Examples: Palo Alto Firewall, CrowdStrike EDR, Splunk SIEM, Tenable Nessus, Okta, CyberArk, AWS Security Hub, KnowBe4, Veeam Backup
regulatory_requirementsarray of stringsApplicable regulations/frameworks. Examples: PCI DSS, HIPAA, GDPR, SOC 2, ISO 27001, NIST 800-53, RBI Guidelines, SEBI

Control Posture (boolean flags)

FieldTypeDescription
has_firewallbooleanNetwork firewall deployed and actively managed
has_antivirusbooleanAntivirus/EDR solution in place across endpoints
has_backup_systembooleanAutomated data backup system operational
has_monitoringbooleanSecurity monitoring / SIEM solution active
has_incident_responsebooleanFormal incident response plan documented and tested
has_access_controlsbooleanIdentity and access management controls implemented
has_data_encryptionbooleanData encryption at rest and in transit enforced
has_vulnerability_scanningbooleanRegular vulnerability scanning conducted
has_security_trainingbooleanSecurity awareness training program in place
has_business_continuitybooleanBusiness continuity and disaster recovery plan exists

What You Get

  • CSF function-by-function coverage — maturity score across Govern, Identify, Protect, Detect, Respond, Recover
  • NIST CSF Tier rating — overall tier assessment (Tier 1 Partial → Tier 4 Adaptive)
  • Subcategory gap map — which specific CSF subcategories (e.g., ID.AM-1, PR.AC-3) are covered, partial, or missing
  • Tool-to-CSF mapping — how your existing tools map to CSF functions and subcategories
  • Regulatory crosswalk — how CSF gaps align to your stated compliance requirements
  • Prioritized improvement roadmap — Quick Wins (0–30 days), Short-term (30–90 days), Strategic (90+ days)
  • Executive summary — board-ready posture summary with tier rating and top risks

Example Output

{
  "organization": "Acme Financial",
  "csf_version": "NIST CSF 2.0",
  "overall_tier": "Tier 2 — Risk Informed",
  "overall_score": 68,
  "function_scores": {
    "govern": { "score": 55, "tier": "Tier 2", "gaps": 3 },
    "identify": { "score": 70, "tier": "Tier 2", "gaps": 2 },
    "protect": { "score": 80, "tier": "Tier 3", "gaps": 1 },
    "detect": { "score": 75, "tier": "Tier 3", "gaps": 1 },
    "respond": { "score": 40, "tier": "Tier 1", "gaps": 4 },
    "recover": { "score": 35, "tier": "Tier 1", "gaps": 3 }
  },
  "tool_mapping": [
    { "tool": "Palo Alto Firewall", "csf_functions": ["Protect (PR.AC, PR.PT)"] },
    { "tool": "CrowdStrike EDR", "csf_functions": ["Detect (DE.CM)", "Respond (RS.AN)"] },
    { "tool": "Splunk SIEM", "csf_functions": ["Detect (DE.CM, DE.AE)", "Respond (RS.AN)"] },
    { "tool": "Tenable Nessus", "csf_functions": ["Identify (ID.RA)", "Protect (PR.IP)"] }
  ],
  "critical_gaps": [
    "No incident response plan — RS.RP-1, RS.CO-1 not met",
    "No business continuity plan — RC.RP-1, RC.CO-3 not met",
    "Govern function weak — GV.OC, GV.RM subcategories not addressed",
    "No formal asset inventory process — ID.AM-1, ID.AM-2 partial"
  ],
  "regulatory_crosswalk": {
    "PCI_DSS": ["Requirement 12.10 (IR plan)", "Requirement 12.3 (risk assessment)"],
    "GDPR": ["Article 32 (security measures)", "Article 33 (breach notification)"]
  },
  "quick_wins": [
    "Document and approve Incident Response Plan (14 days)",
    "Create asset inventory register using existing SIEM data (7 days)",
    "Define cybersecurity roles and responsibilities in a RACI matrix (10 days)"
  ]
}

API Reference

Base URL: https://portal.toolweb.in/apis/compliance/nist-csf-mapper

EndpointMethodDescription
/nist-mappingPOSTMap security controls to NIST CSF 2.0 and generate gap report

Authentication: Pass your API key as X-API-Key header or mcp_api_key argument via MCP.


Pricing

PlanDaily LimitMonthly LimitPrice
Free5 / day50 / month$0
Developer20 / day500 / month$39
Professional200 / day5,000 / month$99
Enterprise100,000 / day1,000,000 / month$299

About

ToolWeb.in — 200+ security APIs, CISSP & CISM certified, built for enterprise compliance practitioners.

Platforms: Pay-per-run · API Gateway · MCP Server · OpenClaw · RapidAPI · YouTube

Comments

Loading comments...