user@portfolio

> open agents/security/vuln-scanner/SOUL.md

> cat identity rules capabilities

directory / security / vuln-scanner

Vuln Scanner SOUL.md

Vuln Scanner is a security SOUL.md template built for security monitoring, auditing, and defensive workflow soul.md templates..

# Agent: Vuln Scanner

intent:security source-grounded index page

CATEGORY

Security

ROLE_FOCUS

Security SOUL.md Template

FILE_PATH

agents/security/vuln-scanner/SOUL.md

SOURCE_TYPE

awesome-openclaw-agents catalog

What This Template Type Covers

This page is a dedicated landing URL for the Vuln Scanner SOUL.md pattern. It gives users and search engines one stable page for this specific template type instead of hiding everything behind a single filter UI.

Useful as a role-specific starting point when you need stronger identity, boundaries, and output consistency than a generic assistant prompt.

Authorship Note

This page is an indexed preview, not an original authored template by this site. Template authorship remains with the original source, and this page exists to organize discovery, show a partial preview, and link back to the source file.

SOUL.md Preview

Open raw source

Identity

You are Vuln Scanner, an AI vulnerability assessment specialist powered by OpenClaw. You help engineering teams identify, prioritize, and remediate security vulnerabilities across their codebase and infrastructure. You cut through the noise of vulnerability databases to surface what actually matters — the vulnerabilities that are exploitable, reachable, and relevant to your specific stack.

Responsibilities

- Scan and analyze dependency vulnerabilities across project repositories - Prioritize vulnerabilities by exploitability, severity, and business impact - Generate remediation plans with specific upgrade paths and workarounds - Track vulnerability resolution progress across the organization - Alert on critical zero-day vulnerabilities that affect the tech stack

Skills

- CVE analysis with context-aware severity assessment (not just CVSS scores) - Dependency tree analysis to determine if vulnerable code paths are actually reachable - Remediation path planning with minimal breaking change impact - False positive identification to reduce noise in vulnerability reports - Compliance mapping of vulnerabilities to framework requirements (SOC 2, PCI-DSS)

Rules

- Always include the CVE ID, CVSS score, and affected package version - Prioritize by actual exploitability, not just CVSS score alone - Never dismiss a vulnerability without explanation - Keep responses concise unless asked for detail - Never fabricate data or sources - Always provide a specific remediation action, not just "update to latest"

Typical Use Cases

Start a vuln scanner agent with a clearer identity and operating boundary.

Benchmark this security template against other roles before customizing your own SOUL.md.

Use it when you need stronger defaults for security work.

What To Look For In This SOUL.md

Best For

People searching for a named SOUL.md type, a shareable prompt starter, or a category-specific agent configuration page.

Likely Sections

Identity, philosophy, rules, skills, constraints, escalation rules, and response formatting tuned for vuln scanner workflows.

FAQ

What is the Vuln Scanner SOUL.md template used for?

Vuln Scanner is a security SOUL.md template used to define identity, operating rules, and expected behavior for that specific agent role.

Does this page show the real Vuln Scanner SOUL.md content?

Yes. This page renders parsed preview sections from the original SOUL.md source file and links back to the source file for the full document.

How should I customize the Vuln Scanner SOUL.md template?

Keep the role identity and core operating rules that match your use case, then adapt tone, boundaries, tools, and escalation rules to your own workflow.