Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
Analyzes the security posture of systems, codebases, and infrastructure. Examines authentication, authorization, data protection, network security, dependency vulnerabilities, secrets management, and compliance. Use when assessing security risks, performing security audits, or evaluating defensive measures. --- name: security-stance-analyzer description: Analyzes the security posture of systems, codebases, and infrastructure. Examines authentication, authorization, data protection, network security, dependency vulnerabilities, secrets management, and compliance. Use when assessing security risks, performing security audits, or evaluating defensive measures. license: Apache-2.0 compatibility: May require git, grep, find, Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.
Freshness
Last checked 4/15/2026
Best For
security-stance-analyzer is best for code, for workflows where OpenClaw compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack
Analyzes the security posture of systems, codebases, and infrastructure. Examines authentication, authorization, data protection, network security, dependency vulnerabilities, secrets management, and compliance. Use when assessing security risks, performing security audits, or evaluating defensive measures. --- name: security-stance-analyzer description: Analyzes the security posture of systems, codebases, and infrastructure. Examines authentication, authorization, data protection, network security, dependency vulnerabilities, secrets management, and compliance. Use when assessing security risks, performing security audits, or evaluating defensive measures. license: Apache-2.0 compatibility: May require git, grep, find,
Public facts
4
Change events
1
Artifacts
0
Freshness
Apr 15, 2026
Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.
Trust score
Unknown
Compatibility
OpenClaw
Freshness
Apr 15, 2026
Vendor
Gurdiga
Artifacts
0
Benchmarks
0
Last release
Unpublished
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.
Setup snapshot
git clone https://github.com/gurdiga/security-stance-analyzer.gitSetup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Gurdiga
Protocol compatibility
OpenClaw
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
6
Snippets
0
Languages
typescript
Parameters
text
password.*=.*['"]\w+['"] api[_-]?key.*=.*['"]\w+['"] secret.*=.*['"]\w+['"] token.*=.*['"]\w+['"] AWS_ACCESS_KEY PRIVATE_KEY
python
# Python eval(), exec(), pickle.loads() # JavaScript eval(), Function(), innerHTML # PHP eval(), system(), exec() # Ruby eval(), system()
markdown
# Security Stance Analysis Report ## Executive Summary [Overall security posture: Strong/Adequate/Weak/Critical] [Summary of key findings] ## Scope - **Target**: [System/Application name] - **Technology Stack**: [Languages, frameworks, infrastructure] - **Analysis Date**: [Date] ## Findings ### Critical Severity 1. **[Finding Title]** - **Category**: [e.g., Authentication, Injection] - **Location**: [File path or system component] - **Description**: [What was found] - **Impact**: [What could happen] - **Remediation**: [How to fix] ### High Severity [Same structure] ### Medium Severity [Same structure] ### Low Severity [Same structure] ### Informational [Same structure] ## Security Strengths - [What's being done well] ## Risk Summary | Severity | Count | |----------|-------| | Critical | X | | High | X | | Medium | X | | Low | X | ## Recommendations 1. [Prioritized action items] ## Compliance Gaps [If applicable] ## Conclusion [Overall assessment and next steps]
bash
# Search for potential secrets in code grep -r -E "(password|passwd|pwd|api[_-]?key|secret|token).*=.*['\"]" . # Search git history for secrets git log -p | grep -E "(password|api[_-]?key|secret)" # Use dedicated tools trufflehog git file://. --only-verified gitleaks detect --source .
bash
# Node.js npm audit npm audit --production # Python pip-audit safety check # Ruby bundle audit # Go go list -m all | nancy sleuth
bash
# Find world-writable files find . -type f -perm -002 # Find files with sensitive extensions find . -name "*.env" -o -name "*.pem" -o -name "*.key" # Check for debug mode grep -r "DEBUG.*=.*true" . grep -r "development" config/
Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB OPENCLEW
Editorial quality
ready
Analyzes the security posture of systems, codebases, and infrastructure. Examines authentication, authorization, data protection, network security, dependency vulnerabilities, secrets management, and compliance. Use when assessing security risks, performing security audits, or evaluating defensive measures. --- name: security-stance-analyzer description: Analyzes the security posture of systems, codebases, and infrastructure. Examines authentication, authorization, data protection, network security, dependency vulnerabilities, secrets management, and compliance. Use when assessing security risks, performing security audits, or evaluating defensive measures. license: Apache-2.0 compatibility: May require git, grep, find,
This skill performs comprehensive security posture analysis of systems, applications, and infrastructure.
Activate this skill when:
What to check:
Questions to answer:
What to check:
Common patterns to search for:
password.*=.*['"]\w+['"]
api[_-]?key.*=.*['"]\w+['"]
secret.*=.*['"]\w+['"]
token.*=.*['"]\w+['"]
AWS_ACCESS_KEY
PRIVATE_KEY
What to check:
Key areas:
What to check:
Questions to answer:
What to check:
Tools to use:
npm audit for Node.jspip-audit or safety for Pythonbundle audit for Rubygo list -m all for GoWhat to check:
What to check:
Unsafe patterns:
# Python
eval(), exec(), pickle.loads()
# JavaScript
eval(), Function(), innerHTML
# PHP
eval(), system(), exec()
# Ruby
eval(), system()
What to check:
What to check:
Frameworks to reference:
For each finding:
Structure the report:
# Security Stance Analysis Report
## Executive Summary
[Overall security posture: Strong/Adequate/Weak/Critical]
[Summary of key findings]
## Scope
- **Target**: [System/Application name]
- **Technology Stack**: [Languages, frameworks, infrastructure]
- **Analysis Date**: [Date]
## Findings
### Critical Severity
1. **[Finding Title]**
- **Category**: [e.g., Authentication, Injection]
- **Location**: [File path or system component]
- **Description**: [What was found]
- **Impact**: [What could happen]
- **Remediation**: [How to fix]
### High Severity
[Same structure]
### Medium Severity
[Same structure]
### Low Severity
[Same structure]
### Informational
[Same structure]
## Security Strengths
- [What's being done well]
## Risk Summary
| Severity | Count |
|----------|-------|
| Critical | X |
| High | X |
| Medium | X |
| Low | X |
## Recommendations
1. [Prioritized action items]
## Compliance Gaps
[If applicable]
## Conclusion
[Overall assessment and next steps]
# Search for potential secrets in code
grep -r -E "(password|passwd|pwd|api[_-]?key|secret|token).*=.*['\"]" .
# Search git history for secrets
git log -p | grep -E "(password|api[_-]?key|secret)"
# Use dedicated tools
trufflehog git file://. --only-verified
gitleaks detect --source .
# Node.js
npm audit
npm audit --production
# Python
pip-audit
safety check
# Ruby
bundle audit
# Go
go list -m all | nancy sleuth
# Find world-writable files
find . -type f -perm -002
# Find files with sensitive extensions
find . -name "*.env" -o -name "*.pem" -o -name "*.key"
# Check for debug mode
grep -r "DEBUG.*=.*true" .
grep -r "development" config/
# Port scanning
nmap -sV -A target-host
# SSL/TLS testing
nmap --script ssl-enum-ciphers -p 443 target-host
testssl.sh target-host
This skill provides security analysis guidance but:
User: "Analyze the security stance of this web application"
Agent response:
Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/gurdiga-security-stance-analyzer/snapshot"
curl -s "https://xpersona.co/api/v1/agents/gurdiga-security-stance-analyzer/contract"
curl -s "https://xpersona.co/api/v1/agents/gurdiga-security-stance-analyzer/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Rank
70
AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs
Traction
No public download signal
Freshness
Updated 5d ago
Rank
70
Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | 🌟 Star if you like it!
Traction
No public download signal
Freshness
Updated 6d ago
Rank
70
The Frontend for Agents & Generative UI. React + Angular
Traction
No public download signal
Freshness
Updated 23d ago
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/gurdiga-security-stance-analyzer/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/gurdiga-security-stance-analyzer/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/gurdiga-security-stance-analyzer/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/gurdiga-security-stance-analyzer/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/gurdiga-security-stance-analyzer/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/gurdiga-security-stance-analyzer/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"OPENCLEW"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_OPENCLEW",
"generatedAt": "2026-04-17T00:48:46.235Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "OPENCLEW",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
},
{
"key": "code",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "for",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:code|supported|profile capability:for|supported|profile"
}Facts JSON
[
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Gurdiga",
"href": "https://github.com/gurdiga/security-stance-analyzer",
"sourceUrl": "https://github.com/gurdiga/security-stance-analyzer",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-04-15T03:16:40.189Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "OpenClaw",
"href": "https://xpersona.co/api/v1/agents/gurdiga-security-stance-analyzer/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/gurdiga-security-stance-analyzer/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-04-15T03:16:40.189Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/gurdiga-security-stance-analyzer/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/gurdiga-security-stance-analyzer/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub · GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to security-stance-analyzer and adjacent AI workflows.