📦 site analyzing tools — 站点综合画像
v1.0.2一键输入域名/IP,秒级输出机房位置、ISP/ASN、CDN/GeoDNS、traceroute路径、延迟、robots策略等完整站点画像,助你掌握部署归属与网络质量。
1· 374·1 当前·1 累计
下载技能包
最后更新
2026/3/12
安全扫描
OpenClaw
安全
high confidenceThe skill's code, network calls, and local file writes are consistent with a site/network analysis tool — nothing requests unrelated credentials or hidden endpoints, but it does make many third‑party network calls and writes a small probe file in the user's home directory.
评估建议
This skill appears to be what it claims: a network/site analysis toolkit. Before installing or running it, note: (1) it will make many outbound requests to public services (ip-api, ipinfo, ipify, Google/Cloudflare DoH) and to the target site(s) — your machine's IP and basic metadata will be visible to those services; (2) it writes ~/.site-analyzer-env.json to your home directory on first run; (3) it will invoke local networking tools (dig, traceroute, ping, whois) if present and fall back to HTT...详细分析 ▾
✓ 用途与能力
Name/description (DNS, traceroute, ping, whois, robots, IP ownership) match the included scripts and runtime behavior. External services (ip-api, ipinfo, ipify, public DoH endpoints) and local binaries (dig/traceroute/ping/whois when available) are used in ways expected for this purpose. The manifest lists no required env vars or credentials, which aligns with the implementation.
✓ 指令范围
SKILL.md and the scripts limit actions to network discovery: probing host public IP and DNS, fetching robots.txt, running whois/traceroute/ping, and querying public IP lookup APIs. The agent is instructed to create/read ~/.site-analyzer-env.json (used as baseline) and to call only the listed scripts. There are no instructions to read unrelated local files, other agents' configs, or secrets.
✓ 安装机制
No install spec; the skill ships as code files and runs in-place. No remote downloads, package installs, or extracted archives are performed by the skill itself.
ℹ 凭证需求
The skill requests no credentials and does not access environment variables. However it makes multiple outbound calls to third-party services (api.ipify.org, ip-api.com via HTTP, ipinfo.io via HTTPS, public DoH endpoints, and robots/target sites). Those calls will disclose the probe host's IP and timing to those services and are intrinsic to the tool's function.
ℹ 持久化与权限
The skill writes a small JSON file at ~/.site-analyzer-env.json to store probe results; always:false and no system-wide config changes. This persistent file is reasonable for baseline measurements but is a change to the user's home directory that the user should be aware of.
安全有层次,运行前请审查代码。
运行时依赖
无特殊依赖
版本
latestv1.0.22026/3/3
- 文档结构优化,流程链图替换为流程图,显示各阶段并发与串行关系 - 新增详细调用流程说明,明确各脚本参数与调用顺序 - 明确各子 skill 索引、主要功能、对应脚本关系 - 详细说明 DNS 查询 UDP 与 DoH 回退策略 - 站点画像输出内容细化,标注符号更直观 - 补充常见注意事项与各子 skill 脚本维护方式
● 无害
安装命令
点击复制官方npx clawhub@latest install site-analyze
镜像加速npx clawhub@latest install site-analyze --registry https://cn.longxiaskill.com