Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Automated security scanning and vulnerability detection for web applications, APIs, and infrastructure. Use when you need to scan targets for vulnerabilities, check SSL certificates, find open ports, detect misconfigurations, or perform security audits. Integrates with nmap, nuclei, and other security tools.
Automated security scanning and vulnerability detection for web applications, APIs, and infrastructure. Use when you need to scan targets for vulnerabilities, check SSL certificates, find open ports, detect misconfigurations, or perform security audits. Integrates with nmap, nuclei, and other security tools.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Automated security scanning toolkit for penetration testing and vulnerability assessment.
nmap -sV -sC -oN scan.txt TARGET
nuclei -u TARGET -o results.txt
sslscan TARGET
Fast initial scan for live hosts and open ports: nmap -sn -T4 SUBNET # Host discovery nmap -F TARGET # Fast port scan (top 100)
Comprehensive port and service detection: nmap -p- -sV -sC -A TARGET -oN full_scan.txt
nuclei -u https://TARGET -t cves/ -t vulnerabilities/ -o web_vulns.txt nikto -h TARGET -o nikto_report.txt
sslscan TARGET testssl.sh TARGET
Save reports to reports/security-scan-YYYY-MM-DD.md with: Target information Open ports and services Vulnerabilities found (severity rated) Recommendations
Only scan authorized targets Get written permission before testing Report vulnerabilities responsibly Never exploit without authorization
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.