auto-security-audit一键自动化安全审计:nmap 端口扫描 + nuclei 12000+ CVE 漏洞检测(内外网双扫)+ SSL/TLS 检查 + SSH/防火墙/fail2ban 系统审计 + Markdown 报告生成。支持 cron 定时扫描 + 飞书推送。
Install via ClawdBot CLI:
clawdbot install nashbuaa-ops/auto-security-auditGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Calls external URL not in known-safe list
https://github.com/projectdiscovery/nuclei/releases/latest/download/nuclei_$(curUses known external API (expected, informational)
api.github.comAudited Apr 16, 2026 · audit v1.0
Generated Mar 20, 2026
This skill automates routine security audits for DevOps teams managing cloud or on-premises servers. It scans for open ports, vulnerabilities, and misconfigurations, generating structured reports to ensure compliance with security policies and reduce manual effort in continuous monitoring.
Small businesses with limited IT resources can use this skill to perform comprehensive security checks on their web servers and internal networks. It identifies critical risks like outdated SSL certificates or weak SSH settings, helping them proactively address vulnerabilities before exploitation.
Security professionals conducting authorized penetration tests leverage this skill for initial reconnaissance and vulnerability scanning. It combines nmap and nuclei to detect CVE and web vulnerabilities, streamlining the assessment phase and providing detailed reports for further analysis.
In academic or training environments, this skill serves as a hands-on tool for students learning about network security and auditing. It demonstrates real-world scanning techniques and risk assessment, with clear outputs for educational purposes in controlled lab settings.
Offer this skill as part of a subscription-based security monitoring service for businesses. Integrate it with cron jobs and notification systems like Feishu to provide automated, scheduled scans and alerts, generating recurring revenue through monthly or annual plans.
Use this skill to enhance cybersecurity consulting offerings by automating initial audits for clients. It reduces time spent on manual scans, allowing consultants to focus on analysis and remediation, with revenue from project-based fees or retainer agreements.
Monetize by integrating this skill into broader security platforms or toolchains, offering premium features like advanced reporting or custom templates. Revenue can come from licensing fees, enterprise support, or upsells within a larger product ecosystem.
💬 Integration Tip
Ensure all required binaries (nmap, nuclei, sslscan) are installed and updated, and configure cron jobs with proper permissions for automated scanning and notifications.
Scored Apr 19, 2026
Perform network reconnaissance and port scanning with Nmap to find open ports, detect services, identify vulnerabilities, and enumerate targets accurately.
Scan networks to discover devices, gather MAC addresses, vendors, and hostnames. Includes safety checks to prevent accidental scanning of public networks.
Security engineering toolkit for threat modeling, vulnerability analysis, secure architecture, and penetration testing. Includes STRIDE analysis, OWASP guida...
Use when conducting security audits, reviewing code for vulnerabilities, or analyzing infrastructure security. Invoke for SAST scans, penetration testing, DevSecOps practices, cloud security reviews.
Test your AI agent for security vulnerabilities using PwnClaw. Runs 50+ attacks (prompt injection, jailbreaks, social engineering, MCP poisoning, and more) and provides fix instructions. Use when your agent needs a security check or hardening.
Test APIs against OWASP API Security Top 10 including discovery, auth abuse, and protocol-specific checks.