Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
CyberAudit — Local Security Audit Skill CyberAudit — Local Security Audit Skill Know your exposure. Fix what matters. *by cybersecurity experts* What This Skill Does CyberAudit runs a local security audit on the user's machine. It checks 4 key areas, generates a security score (0–100), and produces a plain-English report with actionable fixes. No data leaves the machine. How to Run It 1. Detect the OS 2. Run the appropriate audit script 3. Parse the JSON o Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.
Freshness
Last checked 4/15/2026
Best For
cyberaudit-skill is best for general automation workflows where OpenClaw compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack
CyberAudit — Local Security Audit Skill CyberAudit — Local Security Audit Skill Know your exposure. Fix what matters. *by cybersecurity experts* What This Skill Does CyberAudit runs a local security audit on the user's machine. It checks 4 key areas, generates a security score (0–100), and produces a plain-English report with actionable fixes. No data leaves the machine. How to Run It 1. Detect the OS 2. Run the appropriate audit script 3. Parse the JSON o
Public facts
4
Change events
1
Artifacts
0
Freshness
Apr 15, 2026
Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.
Trust score
Unknown
Compatibility
OpenClaw
Freshness
Apr 15, 2026
Vendor
Dremonkey23
Artifacts
0
Benchmarks
0
Last release
Unpublished
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.
Setup snapshot
git clone https://github.com/dremonkey23/cyberaudit-skill.gitSetup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Dremonkey23
Protocol compatibility
OpenClaw
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
5
Snippets
0
Languages
typescript
Parameters
text
Windows → run audit-windows.ps1 Mac/Linux → run audit-unix.sh
powershell
powershell -ExecutionPolicy Bypass -File audit-windows.ps1
bash
bash audit-unix.sh
json
{
"firewall": true,
"autoUpdate": false,
"guestAccount": false,
"riskyPorts": [3389, 5900]
}text
🔐 CyberAudit Report ━━━━━━━━━━━━━━━━━━━ Security Score: 72/100 (C) ✅ Firewall: Active ❌ Auto-Updates: Disabled ✅ Guest Account: Disabled ⚠️ Open Ports: 3389 (RDP) detected 📋 What to Fix: 1. [HIGH] Enable automatic updates → Windows: Settings > Windows Update > Advanced Options > Automatic → Mac: System Settings > General > Software Update > Automatic 2. [MEDIUM] Close port 3389 if you're not using Remote Desktop → Windows: Settings > System > Remote Desktop > toggle OFF ━━━━━━━━━━━━━━━━━━━ by cybersecurity experts | CyberAudit v1.0
Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB OPENCLEW
Editorial quality
ready
CyberAudit — Local Security Audit Skill CyberAudit — Local Security Audit Skill Know your exposure. Fix what matters. *by cybersecurity experts* What This Skill Does CyberAudit runs a local security audit on the user's machine. It checks 4 key areas, generates a security score (0–100), and produces a plain-English report with actionable fixes. No data leaves the machine. How to Run It 1. Detect the OS 2. Run the appropriate audit script 3. Parse the JSON o
Know your exposure. Fix what matters. by cybersecurity experts
CyberAudit runs a local security audit on the user's machine. It checks 4 key areas, generates a security score (0–100), and produces a plain-English report with actionable fixes. No data leaves the machine.
Windows → run audit-windows.ps1
Mac/Linux → run audit-unix.sh
Windows (PowerShell):
powershell -ExecutionPolicy Bypass -File audit-windows.ps1
Mac/Linux (bash):
bash audit-unix.sh
Both scripts output a single JSON object to stdout.
{
"firewall": true,
"autoUpdate": false,
"guestAccount": false,
"riskyPorts": [3389, 5900]
}
Start at 0. Add points:
| Check | Points | |---|---| | Firewall ON | +30 | | Auto-updates ON | +25 | | Guest account disabled | +20 | | No risky ports open | +25 |
Deduct 5 points per risky port found (minimum score: 0).
Grade scale:
| Port | Service | Risk | |---|---|---| | 21 | FTP | HIGH | | 23 | Telnet | HIGH | | 3389 | RDP | MEDIUM | | 5900 | VNC | MEDIUM | | 445 | SMB | HIGH | | 135 | RPC | MEDIUM |
Present exactly like this to the user:
🔐 CyberAudit Report
━━━━━━━━━━━━━━━━━━━
Security Score: 72/100 (C)
✅ Firewall: Active
❌ Auto-Updates: Disabled
✅ Guest Account: Disabled
⚠️ Open Ports: 3389 (RDP) detected
📋 What to Fix:
1. [HIGH] Enable automatic updates
→ Windows: Settings > Windows Update > Advanced Options > Automatic
→ Mac: System Settings > General > Software Update > Automatic
2. [MEDIUM] Close port 3389 if you're not using Remote Desktop
→ Windows: Settings > System > Remote Desktop > toggle OFF
━━━━━━━━━━━━━━━━━━━
by cybersecurity experts | CyberAudit v1.0
Status icons:
Only list items under "What to Fix" for checks that failed. If everything passes, say: "✅ No critical issues found. Nice work."
Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/dremonkey23-cyberaudit-skill/snapshot"
curl -s "https://xpersona.co/api/v1/agents/dremonkey23-cyberaudit-skill/contract"
curl -s "https://xpersona.co/api/v1/agents/dremonkey23-cyberaudit-skill/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Rank
70
AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs
Traction
No public download signal
Freshness
Updated 5d ago
Rank
70
Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | 🌟 Star if you like it!
Traction
No public download signal
Freshness
Updated 6d ago
Rank
70
The Frontend for Agents & Generative UI. React + Angular
Traction
No public download signal
Freshness
Updated 23d ago
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/dremonkey23-cyberaudit-skill/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/dremonkey23-cyberaudit-skill/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/dremonkey23-cyberaudit-skill/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/dremonkey23-cyberaudit-skill/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/dremonkey23-cyberaudit-skill/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/dremonkey23-cyberaudit-skill/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"OPENCLEW"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_OPENCLEW",
"generatedAt": "2026-04-16T23:36:01.160Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "OPENCLEW",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
}
],
"flattenedTokens": "protocol:OPENCLEW|unknown|profile"
}Facts JSON
[
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Dremonkey23",
"href": "https://github.com/dremonkey23/cyberaudit-skill",
"sourceUrl": "https://github.com/dremonkey23/cyberaudit-skill",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-04-15T01:12:35.551Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "OpenClaw",
"href": "https://xpersona.co/api/v1/agents/dremonkey23-cyberaudit-skill/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/dremonkey23-cyberaudit-skill/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-04-15T01:12:35.551Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/dremonkey23-cyberaudit-skill/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/dremonkey23-cyberaudit-skill/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub · GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to cyberaudit-skill and adjacent AI workflows.