dead-link-scannerScan websites, markdown files, and HTML files for broken links (dead links). Use when checking a website for 404s, validating links in documentation or READM...
Install via ClawdBot CLI:
clawdbot install Johnnywang2001/dead-link-scannerGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Calls external URL not in known-safe list
https://example.comAudited Apr 17, 2026 · audit v1.0
Generated Mar 22, 2026
Web developers and QA teams can use this tool to audit live websites for broken links before deployments or after content updates. It helps ensure user experience by identifying 404 errors and connection issues, especially in large sites with frequent content changes. The recursive crawling with depth limits allows thorough checks of internal link structures.
Technical writers and documentation teams can scan markdown and HTML files in repositories to validate external and internal links in READMEs, API docs, or user guides. This prevents outdated references in documentation, improving reliability for users and developers. The file scanning feature supports batch processing of multiple files efficiently.
SEO specialists and digital marketers can use the scanner to identify broken links on websites that harm search engine rankings and user engagement. By detecting dead external and internal links, they can prioritize fixes to improve site health and SEO performance. The JSON output option facilitates integration with reporting tools for ongoing audits.
Organizations migrating websites or content management systems can employ this tool to verify link integrity post-migration. It checks for broken URLs in new environments, ensuring that redirected or moved content remains accessible. The timeout and delay options help manage large-scale scans without overwhelming servers.
Educational institutions and online learning platforms can scan course materials, syllabi, and resource pages for dead links to maintain up-to-date content for students. This ensures that external references in digital learning assets remain functional, enhancing the educational experience. The broken-only filter streamlines the review process for administrators.
Offer a free basic version with limited depth and URL checks, then charge for premium features like unlimited scans, advanced reporting, or API access. This attracts individual developers and small teams while monetizing larger enterprises needing comprehensive audits. Revenue can come from subscription tiers or one-time licenses.
Develop a cloud-based service where users upload files or input URLs via a web interface, with automated scheduled scans and email alerts for broken links. Target businesses needing regular audits without local installation, such as marketing agencies or content teams. Revenue is generated through monthly or annual subscriptions based on usage limits.
Package the scanner as an API or plugin for integration into existing CI/CD pipelines, CMS platforms, or SEO tools. Charge based on API calls or offer custom development for specific workflows, catering to tech companies that prioritize automation. Revenue streams include API usage fees and consulting for bespoke implementations.
💬 Integration Tip
Integrate into CI/CD pipelines using the JSON output option to automate link checks during builds, or add as a pre-commit hook in Git repositories to validate documentation links before commits.
Scored Apr 19, 2026
Security vetting protocol before installing any AI agent skill. Red flag detection for credential theft, obfuscated code, exfiltration. Risk classification L...
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope,...
Comprehensive security auditing for Clawdbot deployments. Scans for exposed credentials, open ports, weak configs, and vulnerabilities. Auto-fix mode included.
Audit codebases and infrastructure for security issues. Use when scanning dependencies for vulnerabilities, detecting hardcoded secrets, checking OWASP top 10 issues, verifying SSL/TLS, auditing file permissions, or reviewing code for injection and auth flaws.
Audit a user's current AI tool stack. Score each tool by ROI, identify redundancies, gaps, and upgrade opportunities. Produces a structured report with score...
Detect anomalies and outliers in construction data: unusual costs, schedule variances, productivity spikes. Statistical and ML-based detection methods.