ISO 27001 ISMS implementation and cybersecurity governance for HealthTech and MedTech companies. Use for ISMS design, security risk assessment, control imple...
--- name: aws-guardduty-explainer description: Translate GuardDuty findings into plain-English incident summaries with actionable response steps tools: claude, bash version: "1.0.0" pack: aws-security
Lead security with infrastructure audits, vulnerability triage, compliance tracking, vendor assessment, and incident response.
Conduct cybersecurity risk assessments by identifying assets, modeling threats, scoring vulnerabilities, mapping compliance, and creating incident response a...
Generate a detailed operations runbook for deploying AI agents, including rollout stages, monitoring, rollback plans, cost estimates, and incident response t...
Incident response and forensics for agent workspaces. Investigate compromises, build timelines, assess blast radius, and collect evidence. Cross-references data from warden, ledger, signet, and sentin
Provides forensically-safe Linux threat detection, network and process analysis, integrity verification, controlled firewall and service remediation preservi...
Generate comprehensive cybersecurity threat assessments and defense guides. Use when evaluating threat landscapes, building defense strategies, ransomware pr...
World-Class Technology & Data Playbook. Use for: software development best practices, IT infrastructure design, cybersecurity strategy, data analytics, busin...
Senior SecOps engineer skill for application security, vulnerability management, compliance verification, and secure development practices. Runs SAST/DAST sc...
Complete Platform Agent Swarm — A coordinated multi-agent system for Kubernetes and OpenShift platform operations. Includes Orchestrator (Jarvis), Cluster Op...
Helps organizations detect crises early, assess severity and type, activate response teams, and communicate effectively to manage reputation and operational...
Complete observability & reliability engineering system. Use when designing monitoring, implementing structured logging, setting up distributed tracing, buil...
Generates detailed IT disaster recovery plans with RTO/RPO targets, failover procedures, backup strategies, communication plans, testing schedules, and cost...
Design and scale team structures, communication, decision frameworks, and roles to maximize organizational effectiveness and sustain growth.
Assess compliance with India's Digital Personal Data Protection (DPDP) Act 2023 across 7 domains with 41 controls. Use when evaluating DPDP readiness, Indian...
Technical leadership guidance for engineering teams, architecture decisions, and technology strategy. Use when assessing technical debt, scaling engineering...
Curated skill bundle for e-commerce platforms, D2C brands and marketplace operators. Activates the firm pyramid with Marketing, Commercial, Operations and En...
Information Security Management System (ISMS) audit expert for ISO 27001 compliance verification, security control assessment, and certification support. Use...
Unified security suite for agent workspaces. Installs, configures, and orchestrates all 11 OpenClaw security tools in one command — integrity, secrets, permissions, network, audit trail, signing, su