{
  "schemaVersion": "1.0",
  "item": {
    "slug": "nmap-recon",
    "name": "Nmap Recon",
    "source": "tencent",
    "type": "skill",
    "category": "开发工具",
    "sourceUrl": "https://clawhub.ai/nsahal/nmap-recon",
    "canonicalUrl": "https://clawhub.ai/nsahal/nmap-recon",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadMode": "redirect",
    "downloadUrl": "/downloads/nmap-recon",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=nmap-recon",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "installMethod": "Manual import",
    "extraction": "Extract archive",
    "prerequisites": [
      "OpenClaw"
    ],
    "packageFormat": "ZIP package",
    "includedAssets": [
      "SKILL.md",
      "skill.json"
    ],
    "primaryDoc": "SKILL.md",
    "quickSetup": [
      "Download the package from Yavira.",
      "Extract the archive and review SKILL.md first.",
      "Import or place the package into your OpenClaw setup."
    ],
    "agentAssist": {
      "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
      "steps": [
        "Download the package from Yavira.",
        "Extract it into a folder your agent can access.",
        "Paste one of the prompts below and point your agent at the extracted folder."
      ],
      "prompts": [
        {
          "label": "New install",
          "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
        },
        {
          "label": "Upgrade existing",
          "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
        }
      ]
    },
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-30T16:55:25.780Z",
      "expiresAt": "2026-05-07T16:55:25.780Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=network",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=network",
        "contentDisposition": "attachment; filename=\"network-1.0.0.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/nmap-recon"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    },
    "downloadPageUrl": "https://openagent3.xyz/downloads/nmap-recon",
    "agentPageUrl": "https://openagent3.xyz/skills/nmap-recon/agent",
    "manifestUrl": "https://openagent3.xyz/skills/nmap-recon/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/nmap-recon/agent.md"
  },
  "agentAssist": {
    "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
    "steps": [
      "Download the package from Yavira.",
      "Extract it into a folder your agent can access.",
      "Paste one of the prompts below and point your agent at the extracted folder."
    ],
    "prompts": [
      {
        "label": "New install",
        "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
      },
      {
        "label": "Upgrade existing",
        "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
      }
    ]
  },
  "documentation": {
    "source": "clawhub",
    "primaryDoc": "SKILL.md",
    "sections": [
      {
        "title": "Nmap Recon",
        "body": "Network reconnaissance and port scanning using Nmap. Use when asked to scan a target, find open ports, detect services, check for vulnerabilities, or perform network reconnaissance."
      },
      {
        "title": "Triggers",
        "body": "\"scan [target]\", \"port scan\", \"nmap\", \"what ports are open\", \"recon [target]\", \"service detection\", \"vulnerability scan\""
      },
      {
        "title": "Requirements",
        "body": "nmap must be installed (standard on Kali, available via package managers)\nRoot/sudo for SYN scans and OS detection"
      },
      {
        "title": "Quick Scan (Top 1000 ports)",
        "body": "nmap -sC -sV -oA scan_$(date +%Y%m%d_%H%M%S) TARGET"
      },
      {
        "title": "Full Port Scan",
        "body": "nmap -p- -sC -sV -oA fullscan_$(date +%Y%m%d_%H%M%S) TARGET"
      },
      {
        "title": "Fast Scan (Quick check)",
        "body": "nmap -F -T4 TARGET"
      },
      {
        "title": "Stealth SYN Scan (requires root)",
        "body": "sudo nmap -sS -sV -O -oA stealth_$(date +%Y%m%d_%H%M%S) TARGET"
      },
      {
        "title": "UDP Scan (Top 100 ports)",
        "body": "sudo nmap -sU --top-ports 100 -oA udp_$(date +%Y%m%d_%H%M%S) TARGET"
      },
      {
        "title": "Vulnerability Scan",
        "body": "nmap --script vuln -oA vulnscan_$(date +%Y%m%d_%H%M%S) TARGET"
      },
      {
        "title": "Aggressive Scan (OS, version, scripts, traceroute)",
        "body": "nmap -A -T4 -oA aggressive_$(date +%Y%m%d_%H%M%S) TARGET"
      },
      {
        "title": "Output Parsing",
        "body": "Nmap outputs in multiple formats with -oA:\n\n.nmap - Human readable\n.xml - Machine parseable\n.gnmap - Greppable format"
      },
      {
        "title": "Parse open ports from greppable output:",
        "body": "grep \"open\" scan.gnmap | awk -F'[/]' '{print $1}' | tr ',' '\\n' | sort -u"
      },
      {
        "title": "Extract service versions:",
        "body": "grep -E \"^[0-9]+/\" scan.nmap | awk '{print $1, $3, $4}'"
      },
      {
        "title": "Quick summary from XML:",
        "body": "xmllint --xpath \"//port[@state='open']\" scan.xml 2>/dev/null"
      },
      {
        "title": "Common Scan Profiles",
        "body": "ProfileCommandUse CaseQuicknmap -F -T4Fast initial reconStandardnmap -sC -sVService detection + default scriptsFullnmap -p- -sC -sVAll 65535 portsStealthsudo nmap -sS -T2Evasive scanningVulnnmap --script vulnVulnerability detectionAggressivenmap -A -T4Full enumeration"
      },
      {
        "title": "Script Categories",
        "body": "# List available scripts\nls /usr/share/nmap/scripts/\n\n# Run specific category\nnmap --script=default,safe TARGET\nnmap --script=vuln TARGET\nnmap --script=exploit TARGET\nnmap --script=auth TARGET\n\n# Run specific script\nnmap --script=http-title TARGET\nnmap --script=smb-vuln* TARGET"
      },
      {
        "title": "Target Specification",
        "body": "# Single host\nnmap 192.168.1.1\n\n# CIDR range\nnmap 192.168.1.0/24\n\n# Range\nnmap 192.168.1.1-254\n\n# From file\nnmap -iL targets.txt\n\n# Exclude hosts\nnmap 192.168.1.0/24 --exclude 192.168.1.1"
      },
      {
        "title": "Timing Templates",
        "body": "-T0 Paranoid (IDS evasion)\n-T1 Sneaky (IDS evasion)\n-T2 Polite (slow)\n-T3 Normal (default)\n-T4 Aggressive (fast)\n-T5 Insane (very fast, may miss ports)"
      },
      {
        "title": "Authorization Required",
        "body": "⚠️ Only scan targets you own or have explicit written authorization to test.\n\nNever scan:\n\nPublic infrastructure without permission\nNetworks you don't control\nProduction systems without approval"
      },
      {
        "title": "Example Workflow",
        "body": "# 1. Quick scan to find live hosts\nnmap -sn 192.168.1.0/24 -oA live_hosts\n\n# 2. Fast port scan on discovered hosts\nnmap -F -T4 -iL live_hosts.gnmap -oA quick_ports\n\n# 3. Deep scan interesting hosts\nnmap -p- -sC -sV -oA deep_scan TARGET\n\n# 4. Vulnerability scan\nnmap --script vuln -oA vuln_scan TARGET"
      }
    ],
    "body": "Nmap Recon\n\nNetwork reconnaissance and port scanning using Nmap. Use when asked to scan a target, find open ports, detect services, check for vulnerabilities, or perform network reconnaissance.\n\nTriggers\n\"scan [target]\", \"port scan\", \"nmap\", \"what ports are open\", \"recon [target]\", \"service detection\", \"vulnerability scan\"\nRequirements\nnmap must be installed (standard on Kali, available via package managers)\nRoot/sudo for SYN scans and OS detection\nUsage\nQuick Scan (Top 1000 ports)\nnmap -sC -sV -oA scan_$(date +%Y%m%d_%H%M%S) TARGET\n\nFull Port Scan\nnmap -p- -sC -sV -oA fullscan_$(date +%Y%m%d_%H%M%S) TARGET\n\nFast Scan (Quick check)\nnmap -F -T4 TARGET\n\nStealth SYN Scan (requires root)\nsudo nmap -sS -sV -O -oA stealth_$(date +%Y%m%d_%H%M%S) TARGET\n\nUDP Scan (Top 100 ports)\nsudo nmap -sU --top-ports 100 -oA udp_$(date +%Y%m%d_%H%M%S) TARGET\n\nVulnerability Scan\nnmap --script vuln -oA vulnscan_$(date +%Y%m%d_%H%M%S) TARGET\n\nAggressive Scan (OS, version, scripts, traceroute)\nnmap -A -T4 -oA aggressive_$(date +%Y%m%d_%H%M%S) TARGET\n\nOutput Parsing\n\nNmap outputs in multiple formats with -oA:\n\n.nmap - Human readable\n.xml - Machine parseable\n.gnmap - Greppable format\nParse open ports from greppable output:\ngrep \"open\" scan.gnmap | awk -F'[/]' '{print $1}' | tr ',' '\\n' | sort -u\n\nExtract service versions:\ngrep -E \"^[0-9]+/\" scan.nmap | awk '{print $1, $3, $4}'\n\nQuick summary from XML:\nxmllint --xpath \"//port[@state='open']\" scan.xml 2>/dev/null\n\nCommon Scan Profiles\nProfile\tCommand\tUse Case\nQuick\tnmap -F -T4\tFast initial recon\nStandard\tnmap -sC -sV\tService detection + default scripts\nFull\tnmap -p- -sC -sV\tAll 65535 ports\nStealth\tsudo nmap -sS -T2\tEvasive scanning\nVuln\tnmap --script vuln\tVulnerability detection\nAggressive\tnmap -A -T4\tFull enumeration\nScript Categories\n# List available scripts\nls /usr/share/nmap/scripts/\n\n# Run specific category\nnmap --script=default,safe TARGET\nnmap --script=vuln TARGET\nnmap --script=exploit TARGET\nnmap --script=auth TARGET\n\n# Run specific script\nnmap --script=http-title TARGET\nnmap --script=smb-vuln* TARGET\n\nTarget Specification\n# Single host\nnmap 192.168.1.1\n\n# CIDR range\nnmap 192.168.1.0/24\n\n# Range\nnmap 192.168.1.1-254\n\n# From file\nnmap -iL targets.txt\n\n# Exclude hosts\nnmap 192.168.1.0/24 --exclude 192.168.1.1\n\nTiming Templates\n-T0 Paranoid (IDS evasion)\n-T1 Sneaky (IDS evasion)\n-T2 Polite (slow)\n-T3 Normal (default)\n-T4 Aggressive (fast)\n-T5 Insane (very fast, may miss ports)\nAuthorization Required\n\n⚠️ Only scan targets you own or have explicit written authorization to test.\n\nNever scan:\n\nPublic infrastructure without permission\nNetworks you don't control\nProduction systems without approval\nExample Workflow\n# 1. Quick scan to find live hosts\nnmap -sn 192.168.1.0/24 -oA live_hosts\n\n# 2. Fast port scan on discovered hosts\nnmap -F -T4 -iL live_hosts.gnmap -oA quick_ports\n\n# 3. Deep scan interesting hosts\nnmap -p- -sC -sV -oA deep_scan TARGET\n\n# 4. Vulnerability scan\nnmap --script vuln -oA vuln_scan TARGET"
  },
  "trust": {
    "sourceLabel": "tencent",
    "provenanceUrl": "https://clawhub.ai/nsahal/nmap-recon",
    "publisherUrl": "https://clawhub.ai/nsahal/nmap-recon",
    "owner": "nsahal",
    "version": "1.0.0",
    "license": null,
    "verificationStatus": "Indexed source record"
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/nmap-recon",
    "downloadUrl": "https://openagent3.xyz/downloads/nmap-recon",
    "agentUrl": "https://openagent3.xyz/skills/nmap-recon/agent",
    "manifestUrl": "https://openagent3.xyz/skills/nmap-recon/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/nmap-recon/agent.md"
  }
}