# Send Vulnerability Scanner to your agent
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
## Fast path
- Download the package from Yavira.
- Extract it into a folder your agent can access.
- Paste one of the prompts below and point your agent at the extracted folder.
## Suggested prompts
### New install

```text
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
```
### Upgrade existing

```text
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
```
## Machine-readable fields
```json
{
  "schemaVersion": "1.0",
  "item": {
    "slug": "vulnerability-scanner",
    "name": "Vulnerability Scanner",
    "source": "tencent",
    "type": "skill",
    "category": "其他",
    "sourceUrl": "https://clawhub.ai/brandonwise/vulnerability-scanner",
    "canonicalUrl": "https://clawhub.ai/brandonwise/vulnerability-scanner",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadUrl": "/downloads/vulnerability-scanner",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=vulnerability-scanner",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "packageFormat": "ZIP package",
    "primaryDoc": "SKILL.md",
    "includedAssets": [
      "SKILL.md",
      "checklists.md",
      "scripts/security_scan.py"
    ],
    "downloadMode": "redirect",
    "sourceHealth": {
      "source": "tencent",
      "slug": "vulnerability-scanner",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-29T13:50:14.045Z",
      "expiresAt": "2026-05-06T13:50:14.045Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=vulnerability-scanner",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=vulnerability-scanner",
        "contentDisposition": "attachment; filename=\"vulnerability-scanner-1.0.0.zip\"",
        "redirectLocation": null,
        "bodySnippet": null,
        "slug": "vulnerability-scanner"
      },
      "scope": "item",
      "summary": "Item download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this item.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/vulnerability-scanner"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    }
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/vulnerability-scanner",
    "downloadUrl": "https://openagent3.xyz/downloads/vulnerability-scanner",
    "agentUrl": "https://openagent3.xyz/skills/vulnerability-scanner/agent",
    "manifestUrl": "https://openagent3.xyz/skills/vulnerability-scanner/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/vulnerability-scanner/agent.md"
  }
}
```
## Documentation

### Vulnerability Scanner

Advanced vulnerability analysis for OWASP 2025, supply chain security, attack surface mapping, and risk prioritization.

### Description

USE WHEN:

Auditing code for security vulnerabilities
Reviewing dependencies for supply chain risks
Scanning for hardcoded secrets or credentials
Identifying dangerous code patterns (injection, XSS, deserialization)
Preparing for security audits or penetration tests
Prioritizing vulnerability remediation by risk

DON'T USE WHEN:

Need runtime dynamic analysis (use actual pentest tools)
Scanning compiled binaries (this is source-code focused)
Need compliance-specific audits (PCI-DSS, HIPAA have dedicated tools)

### Scripts

ScriptPurposeUsagescripts/security_scan.pyFull security scanpython scripts/security_scan.py <path> [--scan-type all|deps|secrets|patterns|config]

### Quick Start

# Full scan
python scripts/security_scan.py /path/to/project

# Just check for secrets
python scripts/security_scan.py /path/to/project --scan-type secrets

# Summary output
python scripts/security_scan.py /path/to/project --output summary

### Reference Files

FilePurposechecklists.mdOWASP Top 10, Auth, API, Data protection checklists

### Core Principles

PrincipleApplicationAssume BreachDesign as if attacker already insideZero TrustNever trust, always verifyDefense in DepthMultiple layers, no single pointLeast PrivilegeMinimum required access onlyFail SecureOn error, deny access

### Threat Modeling Questions

Before scanning, ask:

What are we protecting? (Assets)
Who would attack? (Threat actors)
How would they attack? (Attack vectors)
What's the impact? (Business risk)

### Risk Categories

RankCategoryThink AboutA01Broken Access ControlWho can access what? IDOR, SSRFA02Security MisconfigurationDefaults, headers, exposed servicesA03Software Supply Chain 🆕Dependencies, CI/CD, build integrityA04Cryptographic FailuresWeak crypto, exposed secretsA05InjectionUser input → system commandsA06Insecure DesignFlawed architectureA07Authentication FailuresSession, credential managementA08Integrity FailuresUnsigned updates, tampered dataA09Logging & AlertingBlind spots, no monitoringA10Exceptional Conditions 🆕Error handling, fail-open states

### 2025 Key Changes

2021 → 2025 Shifts:
├── SSRF merged into A01 (Access Control)
├── A02 elevated (Cloud/Container configs)
├── A03 NEW: Supply Chain (major focus)
├── A10 NEW: Exceptional Conditions
└── Focus shift: Root causes > Symptoms

### Attack Surface

VectorRiskQuestion to AskDependenciesMalicious packagesDo we audit new deps?Lock filesIntegrity attacksAre they committed?Build pipelineCI/CD compromiseWho can modify?RegistryTyposquattingVerified sources?

### Defense Principles

Verify package integrity (checksums)
Pin versions, audit updates
Use private registries for critical deps
Sign and verify artifacts

### What to Map

CategoryElementsEntry PointsAPIs, forms, file uploadsData FlowsInput → Process → OutputTrust BoundariesWhere auth/authz checkedAssetsSecrets, PII, business data

### Prioritization Matrix

Risk = Likelihood × Impact

High Impact + High Likelihood → CRITICAL
High Impact + Low Likelihood  → HIGH
Low Impact + High Likelihood  → MEDIUM
Low Impact + Low Likelihood   → LOW

### CVSS + Context

FactorWeightQuestionCVSS ScoreBase severityHow severe is the vuln?EPSS ScoreExploit likelihoodIs it being exploited?Asset ValueBusiness contextWhat's at risk?ExposureAttack surfaceInternet-facing?

### Prioritization Decision Tree

Is it actively exploited (EPSS >0.5)?
├── YES → CRITICAL: Immediate action
└── NO → Check CVSS
         ├── CVSS ≥9.0 → HIGH
         ├── CVSS 7.0-8.9 → Consider asset value
         └── CVSS <7.0 → Schedule for later

### Fail-Open vs Fail-Closed

ScenarioFail-Open (BAD)Fail-Closed (GOOD)Auth errorAllow accessDeny accessParsing failsAccept inputReject inputTimeoutRetry foreverLimit + abort

### What to Check

Exception handlers that catch-all and ignore
Missing error handling on security operations
Race conditions in auth/authz
Resource exhaustion scenarios

### Phase-Based Approach

1. RECONNAISSANCE
   └── Understand the target
       ├── Technology stack
       ├── Entry points
       └── Data flows

2. DISCOVERY
   └── Identify potential issues
       ├── Configuration review
       ├── Dependency analysis
       └── Code pattern search

3. ANALYSIS
   └── Validate and prioritize
       ├── False positive elimination
       ├── Risk scoring
       └── Attack chain mapping

4. REPORTING
   └── Actionable findings
       ├── Clear reproduction steps
       ├── Business impact
       └── Remediation guidance

### High-Risk Patterns

PatternRiskLook ForString concat in queriesInjection"SELECT * FROM " + user_inputDynamic code executionRCEeval(), exec(), Function()Unsafe deserializationRCEpickle.loads(), unserialize()Path manipulationTraversalUser input in file pathsDisabled securityVariousverify=False, --insecure

### Secret Patterns

TypeIndicatorsAPI Keysapi_key, apikey, high entropyTokenstoken, bearer, jwtCredentialspassword, secret, keyCloudAWS_, AZURE_, GCP_ prefixes

### Shared Responsibility

LayerYou OwnProvider OwnsData✅❌Application✅❌OS/RuntimeDependsDependsInfrastructure❌✅

### Cloud-Specific Checks

IAM: Least privilege applied?
Storage: Public buckets?
Network: Security groups tightened?
Secrets: Using secrets manager?

### 10. Anti-Patterns

❌ Don't✅ DoScan without understandingMap attack surface firstAlert on every CVEPrioritize by exploitability + assetIgnore false positivesMaintain verified baselineFix symptoms onlyAddress root causesScan once before deployContinuous scanningTrust third-party deps blindlyVerify integrity, audit code

### Finding Structure

Each finding should answer:

What? - Clear vulnerability description
Where? - Exact location (file, line, endpoint)
Why? - Root cause explanation
Impact? - Business consequence
How to fix? - Specific remediation

### Severity Classification

SeverityCriteriaCriticalRCE, auth bypass, mass data exposureHighData exposure, privilege escalationMediumLimited scope, requires conditionsLowInformational, best practice

Remember: Vulnerability scanning finds issues. Expert thinking prioritizes what matters. Always ask: "What would an attacker do with this?"
## Trust
- Source: tencent
- Verification: Indexed source record
- Publisher: brandonwise
- Version: 1.0.0
## Source health
- Status: healthy
- Item download looks usable.
- Yavira can redirect you to the upstream package for this item.
- Health scope: item
- Reason: direct_download_ok
- Checked at: 2026-04-29T13:50:14.045Z
- Expires at: 2026-05-06T13:50:14.045Z
- Recommended action: Download for OpenClaw
## Links
- [Detail page](https://openagent3.xyz/skills/vulnerability-scanner)
- [Send to Agent page](https://openagent3.xyz/skills/vulnerability-scanner/agent)
- [JSON manifest](https://openagent3.xyz/skills/vulnerability-scanner/agent.json)
- [Markdown brief](https://openagent3.xyz/skills/vulnerability-scanner/agent.md)
- [Download page](https://openagent3.xyz/downloads/vulnerability-scanner)