# Send MUKI Asset Fingerprinting to your agent
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
## Fast path
- Download the package from Yavira.
- Extract it into a folder your agent can access.
- Paste one of the prompts below and point your agent at the extracted folder.
## Suggested prompts
### New install

```text
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
```
### Upgrade existing

```text
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
```
## Machine-readable fields
```json
{
  "schemaVersion": "1.0",
  "item": {
    "slug": "muki-fingerprint",
    "name": "MUKI Asset Fingerprinting",
    "source": "tencent",
    "type": "skill",
    "category": "开发工具",
    "sourceUrl": "https://clawhub.ai/Admin4Giter/muki-fingerprint",
    "canonicalUrl": "https://clawhub.ai/Admin4Giter/muki-fingerprint",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadUrl": "/downloads/muki-fingerprint",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=muki-fingerprint",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "packageFormat": "ZIP package",
    "primaryDoc": "SKILL.md",
    "includedAssets": [
      "SKILL.md",
      "references/Rules.yml",
      "references/active_finger.json",
      "references/active_finger精简.json",
      "references/finger.json",
      "references/quick-reference.md"
    ],
    "downloadMode": "redirect",
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-30T16:55:25.780Z",
      "expiresAt": "2026-05-07T16:55:25.780Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=network",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=network",
        "contentDisposition": "attachment; filename=\"network-1.0.0.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/muki-fingerprint"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    }
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/muki-fingerprint",
    "downloadUrl": "https://openagent3.xyz/downloads/muki-fingerprint",
    "agentUrl": "https://openagent3.xyz/skills/muki-fingerprint/agent",
    "manifestUrl": "https://openagent3.xyz/skills/muki-fingerprint/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/muki-fingerprint/agent.md"
  }
}
```
## Documentation

### MUKI Asset Fingerprinting Tool

MUKI is an active asset fingerprinting tool built for red team operations. It enables security researchers to rapidly pinpoint vulnerable systems from chaotic C-class segments and massive asset lists.

### Prerequisites

Linux amd64 system
Network access to target systems
Explicit written authorization for all target systems

### Quick Start

# Scan single URL
muki -u https://target.com

# Scan multiple URLs from file
muki -l targets.txt

# Scan with proxy
muki -u https://target.com -p socks5://127.0.0.1:1080

# Disable specific modules
muki -u https://target.com -A -N  # No active, no directory scan

### Command Options

-h, --help            Show help
-u, --url string      Single URL to scan
-l, --list string     File containing URLs (one per line)
-o, --output string   Output file path
-p, --proxy string    Proxy server (http:// or socks5://)
-t, --thread int      Number of threads (default: 20, max: 100)
-A, --no-active       Disable active fingerprint scanning
-N, --no-dir          Disable directory scanning  
-x, --no-passive      Disable passive fingerprint scanning

### 1. Active Fingerprinting (-A to disable)

Sends protocol-specific probes to identify services with high confidence.

300+ active fingerprint rules
Covers SSH, RDP, web servers, databases
Protocol-specific probes

### 2. Passive Fingerprinting (-x to disable)

Analyzes response artifacts without additional traffic.

30,000+ precision fingerprints
HTTP headers analysis
TLS JA3 signatures
HTML/CMS patterns
WAF detection

### 3. Sensitive Path Detection (-N to disable)

Checks for high-risk paths using curated dictionaries.

Admin interfaces (/admin, /manage)
Config files (.env, config.php)
Version control (/.git, /.svn)
Vulnerability endpoints (Actuator, ThinkPHP routes)
Backup files (.sql, .tar.gz)

### 4. Sensitive Information Extraction

Automatically extracts high-risk information from responses.

Categories:

Credentials: Passwords, API keys, JDBC strings
Personal Data: Phone numbers, emails, ID cards
Financial: Bank cards
System Info: Internal IPs, versions
Vulnerability Indicators: ID parameters, redirect URLs

### JSON Output

{
  "target": "https://example.com",
  "fingerprints": [
    {
      "service": "Apache",
      "version": "2.4.41",
      "confidence": "high"
    }
  ],
  "sensitive_paths": [
    {
      "path": "/admin",
      "status": 200,
      "risk": "high"
    }
  ],
  "sensitive_data": [
    {
      "type": "email",
      "value": "admin@example.com",
      "source": "response body"
    }
  ]
}

### Excel Output

Structured .xlsx report with multiple sheets:

Asset inventory
Service fingerprints
Sensitive paths
Extracted data

### Standard Reconnaissance

# 1. Prepare target list
cat > targets.txt << 'EOF'
https://target1.com
https://target2.com
192.168.1.0/24
EOF

# 2. Run full scan
muki -l targets.txt -o results.json

# 3. Review results
cat results.json | jq '.fingerprints[]'

# 4. Generate Excel report
muki -l targets.txt -o report.xlsx

### Stealth Scan (with proxy)

# Use Tor proxy for anonymity
muki -u https://target.com -p socks5://127.0.0.1:9050

# Or use HTTP proxy
muki -u https://target.com -p http://127.0.0.1:8080

### Targeted Scan

# Fast scan - only passive fingerprinting
muki -u https://target.com -A -N

# Deep scan - all modules
muki -u https://target.com -t 50

### finger.json (30,000+ fingerprints)

Passive fingerprint database covering:

Web frameworks (React, Vue, Django, Spring)
Middleware (Apache, Nginx, IIS, Tomcat)
CMS (WordPress, Drupal, Joomla)
WAFs (Cloudflare, ModSecurity, AWS WAF)
APIs (GraphQL, REST, SOAP)
Known vulnerabilities (CVE signatures)

### active_finger.json (300+ rules)

Active probing rules for:

Web servers
Databases (MySQL, PostgreSQL, MongoDB)
Remote access (SSH, RDP, Telnet)
Services (Redis, Elasticsearch, Docker)

### Rules.yml

Sensitive information extraction rules organized by groups:

疑似漏洞: ID parameters (SQLi indicators)
指纹信息: URL redirects, sensitive paths
敏感信息: Passwords, accounts, JDBC strings
基础信息: Emails, ID cards, phones, bank cards

### 1. Authorization

Always obtain written authorization before scanning
Define scope clearly (IPs, domains, time windows)
Respect rate limits and business hours

### 2. Stealth

Use proxies for external targets
Adjust thread count to avoid detection
Consider using -A -N for passive-only recon

### 3. Data Handling

Store results securely
Encrypt sensitive findings
Limit access to authorized personnel only
Delete data after engagement ends

### 4. False Positive Reduction

Cross-reference findings with manual verification
Use multiple detection methods
Check context of extracted sensitive data

### Legal and Ethical Considerations

WARNING: This tool is for authorized security testing only.

Unauthorized scanning may violate laws (CFAA, Computer Misuse Act, etc.)
Only use on systems you own or have explicit permission to test
Extracting sensitive data without authorization is illegal
Report findings responsibly through proper channels

### With Other Tools

# Chain with nuclei for vulnerability scanning
cat muki_output.txt | nuclei -t cves/

# Import to Burp Suite
cat results.json | jq -r '.sensitive_paths[].path' > burp_scope.txt

# Feed to SQLMap for SQL injection testing
cat results.json | jq -r '.vulnerable_params[]' | sqlmap -m -

### High Memory Usage

Reduce thread count: -t 10
Scan in smaller batches
Disable passive fingerprinting: -x

### False Positives

Verify findings manually
Check rule specificity in Rules.yml
Adjust confidence thresholds

### Connection Issues

Check proxy configuration
Verify network connectivity
Increase timeout values

### References

Original Repository: https://github.com/yingfff123/MUKI
Fingerprint Databases: See references/finger.json, active_finger.json
Extraction Rules: See references/Rules.yml

### License

MIT License - See original repository for details.
## Trust
- Source: tencent
- Verification: Indexed source record
- Publisher: Admin4Giter
- Version: 1.0.0
## Source health
- Status: healthy
- Source download looks usable.
- Yavira can redirect you to the upstream package for this source.
- Health scope: source
- Reason: direct_download_ok
- Checked at: 2026-04-30T16:55:25.780Z
- Expires at: 2026-05-07T16:55:25.780Z
- Recommended action: Download for OpenClaw
## Links
- [Detail page](https://openagent3.xyz/skills/muki-fingerprint)
- [Send to Agent page](https://openagent3.xyz/skills/muki-fingerprint/agent)
- [JSON manifest](https://openagent3.xyz/skills/muki-fingerprint/agent.json)
- [Markdown brief](https://openagent3.xyz/skills/muki-fingerprint/agent.md)
- [Download page](https://openagent3.xyz/downloads/muki-fingerprint)