web-reconWebsite vulnerability scanner and security audit toolkit. Scan any website for security issues: open ports (nmap), exposed secrets, subdomain enumeration, di...
Install via ClawdBot CLI:
clawdbot install p0lish/web-reconGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Calls external URL not in known-safe list
https://example.comAudited Apr 17, 2026 · audit v1.0
Generated Mar 20, 2026
Security teams use this skill to conduct comprehensive vulnerability assessments of internal or client web applications. It automates scanning for common issues like misconfigured headers, exposed secrets, and open ports, generating prioritized reports for remediation.
Bug bounty hunters leverage the skill for initial reconnaissance on target domains, quickly identifying low-hanging vulnerabilities such as subdomains, directories, and security header weaknesses. The modular design allows focused scans to save time during active hunting.
Organizations in regulated industries employ the skill to validate compliance with security standards by scanning for SSL/TLS issues, CORS misconfigurations, and sensitive file exposures. It provides audit-ready reports to demonstrate due diligence.
Development teams integrate the skill into CI/CD pipelines to scan staging environments for vulnerabilities before deployment. It checks for secrets in code, security headers, and WordPress vulnerabilities, ensuring secure releases.
Instructors and students use the skill in cybersecurity courses to practice hands-on web reconnaissance techniques. Its structured output helps learners analyze real-world scenarios like port scanning and subdomain enumeration safely.
Offer recurring access to automated scanning reports for clients, with tiered plans based on scan frequency and depth. Revenue comes from monthly or annual subscriptions, targeting small to medium businesses needing ongoing security monitoring.
Provide on-demand pentesting and audit services using the skill for detailed reports. Charge per project or hourly, appealing to organizations requiring compliance checks or pre-launch security reviews without long-term commitments.
Distribute a basic version of the skill for free to attract users, then monetize advanced features like priority support, custom wordlists, or API access. Upsell to enterprises needing enhanced capabilities and integration options.
💬 Integration Tip
Install required tools like nmap and Nuclei beforehand, and set environment variables like SHODAN_API_KEY for enhanced functionality to avoid scan gaps.
Scored Apr 19, 2026
Perform network reconnaissance and port scanning with Nmap to find open ports, detect services, identify vulnerabilities, and enumerate targets accurately.
Scan networks to discover devices, gather MAC addresses, vendors, and hostnames. Includes safety checks to prevent accidental scanning of public networks.
Security engineering toolkit for threat modeling, vulnerability analysis, secure architecture, and penetration testing. Includes STRIDE analysis, OWASP guida...
Use when conducting security audits, reviewing code for vulnerabilities, or analyzing infrastructure security. Invoke for SAST scans, penetration testing, DevSecOps practices, cloud security reviews.
Test APIs against OWASP API Security Top 10 including discovery, auth abuse, and protocol-specific checks.
Test your AI agent for security vulnerabilities using PwnClaw. Runs 50+ attacks (prompt injection, jailbreaks, social engineering, MCP poisoning, and more) and provides fix instructions. Use when your agent needs a security check or hardening.