open-cve-scanner-repo오픈소스 취약점 분석 스킬. 사용자가 오픈소스 패키지 이름과 사용 중인 버전을 입력하면, NVD(NIST), OSV.dev(Google), GitHub Advisory 3개 데이터 소스에서 CVE 취약점을 조회하여 최신 버전 정보와 함께 보안 리포트를 생성한다. 마크다운, Exce...
Install via ClawdBot CLI:
clawdbot install rebugui/open-cve-scanner-repoGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Calls external URL not in known-safe list
https://img.shields.io/badge/License-AGPL%20v3-blue.svgUses known external API (expected, informational)
api.github.comAudited Apr 16, 2026 · audit v1.0
Generated Mar 21, 2026
Development teams can use this skill to scan dependencies in package.json or requirements.txt files before deployment, identifying critical vulnerabilities like Log4Shell. It helps ensure secure code releases by integrating into CI/CD pipelines for automated checks.
Banks and fintech companies can audit open-source libraries in their applications to meet regulatory requirements and prevent data breaches. The skill's multi-source CVE scanning from NVD and GitHub Advisory ensures comprehensive risk assessment for compliance reports.
DevOps engineers can incorporate this skill into their toolchain to monitor vulnerabilities in containerized environments or microservices. By analyzing Go or Rust dependencies, it supports proactive patching and reduces attack surfaces in cloud infrastructure.
Universities or cybersecurity training programs can use this skill to teach students about vulnerability management and CVE analysis. It provides hands-on experience with real-world tools, outputting reports in markdown or JSON for academic projects.
Organizations can assess the security of software from external vendors by scanning provided dependency files like pom.xml or Gemfile.lock. This helps in procurement processes to evaluate risks before integrating third-party solutions.
Offer the skill as a cloud-based service with tiered subscriptions for different scan volumes and features like priority API access. Revenue comes from monthly fees, with enterprise plans including advanced reporting and integration support.
Sell on-premise licenses to large organizations needing full control over data and compliance. This includes custom integrations, dedicated support, and updates, generating revenue through one-time purchases or annual maintenance contracts.
Provide a free basic version for individual developers or small teams, with limits on scans or data sources. Monetize by offering premium features like batch file analysis, higher rate limits, and Excel/CSV exports through paid upgrades.
💬 Integration Tip
Integrate into CI/CD pipelines using command-line calls for automated scans during build processes, and set environment variables like NVD_API_KEY to optimize API rate limits.
Scored Apr 19, 2026
Security vetting protocol before installing any AI agent skill. Red flag detection for credential theft, obfuscated code, exfiltration. Risk classification L...
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope,...
Comprehensive security auditing for Clawdbot deployments. Scans for exposed credentials, open ports, weak configs, and vulnerabilities. Auto-fix mode included.
Audit codebases and infrastructure for security issues. Use when scanning dependencies for vulnerabilities, detecting hardcoded secrets, checking OWASP top 10 issues, verifying SSL/TLS, auditing file permissions, or reviewing code for injection and auth flaws.
Audit a user's current AI tool stack. Score each tool by ROI, identify redundancies, gaps, and upgrade opportunities. Produces a structured report with score...
Detect anomalies and outliers in construction data: unusual costs, schedule variances, productivity spikes. Statistical and ML-based detection methods.