incident-responder
π―Skillfrom useai-pro/openclaw-skills-security
An OpenClaw security skill for automated security incident response, providing structured playbooks for handling security events.
Same repository
useai-pro/openclaw-skills-security(13 items)
Installation
npx vibeindex add useai-pro/openclaw-skills-security --skill incident-respondernpx skills add useai-pro/openclaw-skills-security --skill incident-responder~/.claude/skills/incident-responder/SKILL.mdSKILL.md
More from this repository10
Security-first skills for the OpenClaw ecosystem providing skill auditing (typosquatting, permissions, prompt injection detection) and environment setup auditing (credential leaks, unsafe defaults, missing sandbox).
A security-first skill that audits any SKILL.md before installation, checking for typosquatting, unsafe permissions, prompt injection, supply chain risks, and data exfiltration attempts.
A security-first skill for the OpenClaw ecosystem that audits SKILL.md files before installation, checking for typosquatting, permission issues, prompt injection, supply chain risks, and data exfiltration threats.
A Claude Code skill for hardening configurations as part of the OpenClaw security skills ecosystem, providing security auditing capabilities alongside specialized reusable security check modules.
An OpenClaw security skill that scans for credential leaks and hardcoded secrets in code, part of the UseAI.pro security-first skills collection.
An OpenClaw security skill that audits file and system permissions to detect overly permissive access configurations.
An OpenClaw security skill that sanitizes agent outputs to prevent data exfiltration and information leakage.
An OpenClaw security skill that audits project dependencies for known vulnerabilities and supply chain risks.
An OpenClaw security skill that monitors network activity and detects suspicious outbound connections from agent operations.
A prompt guard skill from the OpenClaw security skills collection that audits SKILL.md files and environments for typosquatting, permissions issues, prompt injection, supply chain risks, and credential leaks.