network-scanScans specified network targets and ports using nmap with options for speed, timeout, host limits, and exclusions, returning detailed JSON results.
Install via ClawdBot CLI:
clawdbot install ApacheUA/network-scanThis skill scans ports and devices on a network using nmap. It supports various target formats, including CIDR notation, IP ranges, and comma-separated lists. Defaults to quick scan for CIDR.
target: The target network or IP address to scan (e.g., 192.168.1.0/24, 192.168.1.1-192.168.1.10, 192.168.1.1,192.168.1.2).ports: The ports to scan (e.g., 80,443).--quick: (Optional) Scan only the top 10 ports.--fast: (Optional) Use aggressive scan settings (nmap -T4).--timeout: (Optional) Set a timeout in seconds for the scan (default: 30).--top-ports: (Optional) Scan the top N most common ports (e.g., --top-ports 100).--hosts-limit: (Optional) Limit the number of hosts to scan (e.g., --hosts-limit 50).--exclude: (Optional) Exclude a specific IP address from the scan (e.g., --exclude 192.168.1.5).JSON object containing the nmap scan results. Includes scan results, nmap command used, and scan information.
To use this skill, call it with the target and ports parameters:
network-scan target=192.168.1.0/24 ports=80,443 --fast --timeout 60 --hosts-limit 50 --exclude 192.168.1.100
Generated Mar 1, 2026
IT teams use this skill to perform routine security audits by scanning internal networks for open ports and unauthorized devices. It helps identify vulnerabilities like exposed services or misconfigured firewalls, enabling proactive threat mitigation.
Network administrators employ this skill to monitor network health by scanning for active devices and services across subnets. It aids in inventory management, detecting rogue devices, and ensuring compliance with network policies.
Ethical hackers utilize this skill during penetration tests to map target networks, identify live hosts, and enumerate open ports for further exploitation. It supports reconnaissance phases with customizable options like aggressive scans and exclusions.
In academic settings, students and instructors use this skill in cybersecurity labs to learn about network scanning techniques. It provides hands-on experience with nmap commands and result interpretation in a controlled environment.
DevOps teams integrate this skill into CI/CD pipelines to validate network configurations in staging environments. It checks for expected open ports on servers and containers, ensuring deployments meet security standards.
Offer this skill as part of a cloud-based security platform with subscription tiers. Provide automated scanning, reporting dashboards, and compliance features to businesses, generating recurring revenue from monthly or annual fees.
Bundle this skill with professional services like security assessments and network audits. Charge clients per project or hourly for expert analysis and remediation recommendations based on scan results.
Provide a free basic version of this skill with limited scans, and monetize through premium upgrades. Offer advanced features like bulk scanning, API access, and detailed analytics to convert users to paid plans.
💬 Integration Tip
Integrate this skill with alerting systems like Slack or email to notify teams of scan results. Use it alongside vulnerability databases to cross-reference open ports with known exploits.
Automatically update Clawdbot and all installed skills once daily. Runs via cron, checks for updates, applies them, and messages the user with a summary of what changed.
Full desktop computer use for headless Linux servers. Xvfb + XFCE virtual desktop with xdotool automation. 17 actions (click, type, scroll, screenshot, drag,...
Essential Docker commands and workflows for container management, image operations, and debugging.
Tool discovery and shell one-liner reference for sysadmin, DevOps, and security tasks. AUTO-CONSULT this skill when the user is: troubleshooting network issues, debugging processes, analyzing logs, working with SSL/TLS, managing DNS, testing HTTP endpoints, auditing security, working with containers, writing shell scripts, or asks 'what tool should I use for X'. Source: github.com/trimstray/the-book-of-secret-knowledge
Deploy applications and manage projects with complete CLI reference. Commands for deployments, projects, domains, environment variables, and live documentation access.
Monitor topics of interest and proactively alert when important developments occur. Use when user wants automated monitoring of specific subjects (e.g., product releases, price changes, news topics, technology updates). Supports scheduled web searches, AI-powered importance scoring, smart alerts vs weekly digests, and memory-aware contextual summaries.