🧪 Skills

Threat Assessment & Defense Guide Generator

Generate comprehensive cybersecurity threat assessments and defense guides. Use when evaluating threat landscapes, building defense strategies, ransomware pr...

v1.3.2
❤️ 0
⬇️ 71
👁 1
Share

Description


name: threat-assessment-defense-guide description: Generate comprehensive cybersecurity threat assessments and defense guides. Use when evaluating threat landscapes, building defense strategies, ransomware protection plans, phishing defense, APT mitigation, supply chain security, or any threat modeling and defense planning. version: 1.0.0 homepage: https://portal.toolweb.in metadata: openclaw: emoji: "🛡️" requires: env: - TOOLWEB_API_KEY bins: - curl primaryEnv: TOOLWEB_API_KEY os: - linux - darwin - win32 category: security

Threat Assessment & Defense Guide Generator 🛡️⚔️

Generate comprehensive cybersecurity threat assessments and tailored defense guides. Analyzes threat vectors relevant to your industry and assets, then produces actionable defense strategies, detection methods, and incident response recommendations.

Built by a CISSP/CISM certified security professional at ToolWeb.in

When to Use

  • User asks for a threat assessment or threat analysis
  • User wants to build a defense strategy against specific threats
  • User mentions ransomware, phishing, APT, DDoS, or other threat types
  • User needs a defense guide for their organization
  • User asks about threat modeling or threat landscape analysis
  • User wants cybersecurity defense recommendations for their industry
  • User asks "what threats should I worry about" or "how to defend against X"

Prerequisites

  • TOOLWEB_API_KEY — Get your API key from portal.toolweb.in
  • curl must be available on the system

API Endpoint

POST https://hub.toolweb.in/security/threat-assessment-defense/

Workflow

  1. Gather inputs from the user. Ask about:

    • What threat types concern them (e.g., Ransomware, Phishing, APT, DDoS, Insider Threat, Supply Chain Attack, Zero-Day Exploits, Social Engineering, Data Exfiltration, Cloud Security Threats)
    • What industry they are in (e.g., Technology, Healthcare, Finance, Manufacturing, Government, Education, Retail, Energy)
    • What assets they want to protect (e.g., Cloud Infrastructure, On-Premise Servers, Endpoints, Network, Web Applications, Databases, IoT Devices, OT/SCADA Systems, Mobile Devices)
    • Any other context (organization size, existing security tools, compliance requirements)
  2. Construct the threatOptions from user input. Map their answers into the threatOptions dictionary:

{
  "threatOptions": {
    "threat_type": ["Ransomware", "Phishing"],
    "industry": ["Healthcare"],
    "assets": ["Cloud Infrastructure", "Endpoints", "Databases"]
  }
}

Include any additional categories the user mentions as key-value pairs in threatOptions.

  1. Call the API:
curl -s -X POST "https://hub.toolweb.in/security/threat-assessment-defense/" \
  -H "Content-Type: application/json" \
  -H "X-API-Key: $TOOLWEB_API_KEY" \
  -d '{
    "threatOptions": {
      "threat_type": ["<threat1>", "<threat2>"],
      "industry": ["<industry>"],
      "assets": ["<asset1>", "<asset2>"]
    },
    "sessionId": "<generate-unique-id>",
    "timestamp": "<current-ISO-timestamp>"
  }'

Generate a unique sessionId (e.g., UUID or timestamp-based) and set timestamp to the current ISO 8601 datetime.

  1. Parse the response. The API returns a comprehensive defense guide including:

    • Threat landscape analysis for the specified threats
    • Industry-specific risk context
    • Defense strategies and recommended controls
    • Detection and monitoring recommendations
    • Incident response guidance
    • Tool and technology recommendations
  2. Present results to the user:

    • Lead with the most critical threats identified
    • Present defense strategies in priority order
    • Include specific, actionable recommendations
    • Offer to deep-dive into any specific threat or defense area

Output Format

Present the assessment as follows:

🛡️ Threat Assessment & Defense Guide
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

Industry: [industry]
Threats Assessed: [threat_type list]
Assets in Scope: [assets list]

⚠️ Threat Landscape:
[Summary of relevant threats and their severity]

🛡️ Defense Strategies:
[Prioritized defense recommendations]

🔍 Detection & Monitoring:
[What to monitor and how to detect attacks]

🚨 Incident Response:
[Steps to take when an attack occurs]

🔧 Recommended Tools:
[Specific security tools and technologies]

📎 Full report powered by ToolWeb.in

Error Handling

  • If TOOLWEB_API_KEY is not set: Tell the user to get an API key from https://portal.toolweb.in (plans start at ₹2,999/month or ~$36/month)
  • If the API returns 401: API key is invalid or expired — direct user to portal.toolweb.in to check their subscription
  • If the API returns 429: Rate limit exceeded — wait and retry after 60 seconds
  • If the API returns 500: Inform user of a temporary service issue and suggest retrying in a few minutes
  • If curl is not available: Suggest installing curl (apt install curl / brew install curl)

Example Interaction

User: "I'm worried about ransomware attacks on our hospital's systems. Can you assess the threat and tell me how to defend against it?"

Agent flow:

  1. Identify: threat_type=Ransomware, industry=Healthcare, assets likely include Endpoints, Databases, Network
  2. Ask: "Besides ransomware, are there other threats you want me to assess? And what specific systems should I focus on — cloud, on-premise servers, medical devices?"
  3. User responds: "Also worried about phishing. Focus on endpoints and our patient database."
  4. Call API:
curl -s -X POST "https://hub.toolweb.in/security/threat-assessment-defense/" \
  -H "Content-Type: application/json" \
  -H "X-API-Key: $TOOLWEB_API_KEY" \
  -d '{
    "threatOptions": {
      "threat_type": ["Ransomware", "Phishing"],
      "industry": ["Healthcare"],
      "assets": ["Endpoints", "Databases"]
    },
    "sessionId": "sess-20260312-001",
    "timestamp": "2026-03-12T12:00:00Z"
  }'
  1. Present the defense guide with healthcare-specific ransomware and phishing defense strategies

Pricing

  • API access via portal.toolweb.in subscription plans
  • Free trial: 10 API calls/day, 50 API calls/month to test the skill
  • Developer: $39/month — 20 calls/day and 500 calls/month
  • Professional: $99/month — 200 calls/day, 5000 calls/month
  • Enterprise: $299/month — 100K calls/day, 1M calls/month

##About

Created by ToolWeb.in — a security-focused MicroSaaS platform with 200+ security APIs, built by a CISSP & CISM certified professional. Trusted by security teams in USA, UK, and Europe and we have platforms for "Pay-per-run", "API Gateway", "MCP Server", "OpenClaw", "RapidAPI" for execution and YouTube channel for demos.

Related Skills

  • OT Security Posture Scorecard — Assess OT/ICS/SCADA security posture
  • ISO 42001 AIMS Readiness — AI governance compliance assessment
  • Data Breach Impact Calculator — Estimate breach costs
  • IT Risk Assessment Tool — IT infrastructure risk assessment

Tips

  • Be specific about your threat concerns — "ransomware targeting healthcare" gives better results than just "ransomware"
  • Include all relevant asset types for a comprehensive defense strategy
  • Run assessments quarterly as the threat landscape evolves
  • Use the defense guide as a basis for security budget justification
  • Combine with the IT Risk Assessment Tool for a complete security picture

Reviews (0)

Sign in to write a review.

No reviews yet. Be the first to review!

Comments (0)

Sign in to join the discussion.

No comments yet. Be the first to share your thoughts!

Compatible Platforms

Pricing

Free

Related Configs