首页龙虾技能列表 › HomeNetworkSecurityAgent — 技能工具

HomeNetworkSecurityAgent — 技能工具

v1.0.0

Audits local network infrastructure, identifies active hosts, and scans the gateway/public IP for exposed ports and vulnerabilities.

0· 36·0 当前·0 累计
by @assix (Anthony Assi)·MIT-0
下载技能包
License
MIT-0
最后更新
2026/4/12
安全扫描
VirusTotal
无害
查看报告
OpenClaw
可疑
medium confidence
The skill is mostly coherent for local network scanning, but some implementation choices (naive subnet inference, unsolicited external call to ifconfig.me, and ability to scan arbitrary IPs deeply) create risks and unexpected behavior that you should review before installing.
评估建议
This skill appears to do what it says (local and gateway scanning) but has some risky implementation details. Before installing: (1) only run this on networks and devices you own or have explicit permission to scan—deep scans can be disruptive or violate terms of service; (2) be aware the script blindly converts the gateway IP to a /24 subnet and may scan public addresses if your gateway IP is not a private LAN address; (3) the script fetches your public IP from ifconfig.me (an external third-pa...
详细分析 ▾
用途与能力
The name, description, declared required binaries (python3, nmap, ip), and included code all align with a home-network scanning purpose. The included scanner.py implements gateway discovery, LAN ping sweeps, and nmap port/vulnerability scans, which are expected for this skill.
指令范围
Instructions and the code stay within network-scanning tasks, but the implementation has unsafe/naive behavior: it infers a /24 subnet from the gateway IP without verifying it's a private/local address, which can cause scans of public/third-party address ranges. The script also makes an external HTTP call to ifconfig.me to fetch the public IP (expected, but notable). There are no safeguards, confirmations, or rate limits for deep scans (-p-), which can be disruptive and potentially legally sensitive if used on addresses you do not own.
安装机制
This is instruction-only with a bundled Python script and no install spec — nothing is downloaded or installed by the registry. That is the lowest-risk install model. Note: the script uses the Python 'requests' module but the skill does not declare Python dependencies; this may cause runtime failures but not a direct security issue.
凭证需求
The skill requests no environment variables or credentials (proportionate). It does perform network I/O (nmap scans, ip route, and an HTTP request to ifconfig.me). Network access is expected for this purpose, but the external call and ability to scan arbitrary targets should be understood and limited to networks you control.
持久化与权限
The skill does not request persistent privileges (always:false) and does not modify other skills or system-wide configuration. It requires only runtime invocation and standard binaries.
安全有层次,运行前请审查代码。

License

MIT-0

可自由使用、修改和再分发,无需署名。

运行时依赖

无特殊依赖

版本

latestv1.0.02026/4/12

Initial release of HomeNetworkSecurityAgent. - Audits internal and external network security. - Discovers active devices on the local network. - Scans gateway/public IP for open ports and vulnerabilities. - Provides tools for network topology identification, LAN host discovery, and port/vulnerability scanning. - Requires python3, nmap, and ip binaries on host system.

● 无害

安装命令 点击复制

官方npx clawhub@latest install home-network-security-agent
镜像加速npx clawhub@latest install home-network-security-agent --registry https://cn.clawhub-mirror.com

技能文档

This agent performs internal and external security audits of your home network environment. It utilizes nmap to discover devices and footprint exposed services.

Setup

Ensure nmap is installed on the host system:
sudo apt install nmap

User Instructions

  • "Scan my local network and tell me what devices are online."
  • "Find my public IP and gateway, then check if my gateway management ports (like 8443, 443) or DNS resolvers (like port 53) are exposed to the outside."
  • "Run a deep vulnerability scan on my router to see if it needs a firmware update."

Tools

get_network_topology

Retrieves the default gateway IP and the external public IP address of the network.
  • Inputs: None
  • Call: python3 scanner.py --tool get_network_topology

discover_lan_hosts

Performs a ping sweep on the local subnet to identify all connected physical and IoT devices.
  • Inputs: gateway_ip (string)
  • Call: python3 scanner.py --tool discover_lan_hosts --target {{gateway_ip}}

scan_ports_and_vulns

Runs a service detection scan against a target IP (local or public) to list open ports and identify potential misconfigurations.
  • Inputs: ip_address (string), scan_type (string: "fast" or "deep")
  • Call: python3 scanner.py --tool scan_ports_and_vulns --target {{ip_address}} --type {{scan_type}}
数据来源:ClawHub ↗ · 中文优化:龙虾技能库
OpenClaw 技能定制 / 插件定制 / 私有工作流定制

免费技能或插件可能存在安全风险,如需更匹配、更安全的方案,建议联系付费定制

了解定制服务