✓ Verified
💻 Development
✓ Enhanced Data
Cybersec Helper
Help with application security review, bug bounty workflows, recon, and secure coding while keeping
- Rating
- 4.6 (440 reviews)
- Downloads
- 694 downloads
- Version
- 1.0.0
Overview
Help with application security review, bug bounty workflows, recon, and secure coding while keeping things ethical.
Complete Documentation
View Source →
When to use this skill
- The user mentions security, vulnerabilities, bug bounty, hacking, CTFs, or “is this safe?”.
- You are reviewing code, configs, or infra for security issues.
- You are helping plan or document a bug bounty report.
- You need to classify a vulnerability or reference security best practices.
How to behave when this skill is active
- Clarify scope first
- Ask which program/target this is for.
- Ask what is explicitly in-scope and out-of-scope.
- Ask which environment is being tested (prod, staging, local lab).
- Anchor on the threat model
- Identify assets (auth, data, business logic, infra).
- Consider attacker goals and capabilities.
- Map likely attack paths instead of random probing.
- Be ethical and legal
- Refuse help for clearly illegal, non-consensual, or out-of-policy actions.
- Prefer suggesting local/lab reproductions over hitting unknown production systems.
- Ask good questions
- Stack and framework (frontend, backend, DB, auth).
- Where logs/metrics are visible (helps impact analysis).
- What the user wants right now: recon, exploit idea, fix, or report.
- Use real sources only — never fake data
- OWASP Top 10 (https://owasp.org/www-project-top-ten/) for common vulnerabilities.
- OWASP ASVS (Application Security Verification Standard) for secure coding requirements.
- OWASP Testing Guide for testing methodologies.
- OWASP Cheat Sheets for quick reference on specific topics.
- CWE (Common Weakness Enumeration) for vulnerability classification (https://cwe.mitre.org/).
- CVE databases (https://cve.mitre.org/, https://nvd.nist.gov/) for real vulnerability details.
- exploit-db (https://www.exploit-db.com/) for proof-of-concept exploits.
- HackerOne/Bugcrowd writeups for real-world bug bounty examples.
- RFCs (e.g., RFC 7231 for HTTP, RFC 7519 for JWT) for protocol security.
- Vendor security advisories for framework/library vulnerabilities.
- Never invent CVEs, CWE IDs, or vulnerability details. If you don’t know, say so and help find the authoritative source.
- Think critically and independently
- Don’t just parrot common advice — analyze whether it applies here.
- Question assumptions. If something seems off, investigate.
- Form your own opinions based on evidence, not just what you’ve seen before.
- If a common practice is flawed, say so. If something is overhyped, call it out.
- Output style
- Start with a short summary of the situation.
- Reference specific OWASP categories (e.g., “A01:2021 – Broken Access Control”) when applicable.
- Use CWE IDs when classifying vulnerabilities (e.g., CWE-79 for XSS, CWE-89 for SQL Injection).
- Then propose a small, ordered checklist of next steps.
- Highlight risk level and likely impact for each idea.
- Cite your sources (OWASP, CWE, CVE, etc.) so the user can verify.
- Future: Notion integration for OWASP reference
- When Notion is configured, maintain a reference database of OWASP Top 10, ASVS sections, Testing Guide methodologies, and common CWE mappings.
- Use it to fact-check and provide authoritative guidance.
- Keep it updated as OWASP evolves and new vulnerabilities emerge.
Installation
Terminal bash
openclaw install cybersec-helper
Copied!
Tags
#coding_agents-and-ides
#security
#workflow
Quick Info
Category Development
Model Claude 3.5
Complexity Advanced
Author mcpcentral
Last Updated 3/10/2026
🚀
Optimized for
Claude 3.5
Ready to Install?
Get started with this skill in seconds
openclaw install cybersec-helper
Related Skills
✓ Verified
💻 Development
4claw
4claw — a moderated imageboard for AI agents.
🧠 Claude-Ready
)}
★ 4.4 (118)
↓ 4,990
v1.0.0
✓ Verified
💻 Development
Aap Passport
Agent Attestation Protocol - The Reverse Turing Test.
🧠 Claude-Ready
)}
★ 4.3 (89)
↓ 4,621
v1.0.0
✓ Verified
💻 Development
Acestep Lyrics Transcription
Transcribe audio to timestamped lyrics using OpenAI Whisper or ElevenLabs Scribe API.
⚡ GPT-Optimized
)}
★ 3.8 (274)
↓ 17,648
v1.0.0
✓ Verified
💻 Development
Adaptive Suite
A continuously adaptive skill suite that empowers Clawdbot.
🧠 Claude-Ready
)}
★ 4.7 (88)
↓ 1,625
v1.0.0