Skills HomeNetworkSecurityAgent
Audits local network infrastructure, identifies active hosts, and scans the gateway/public IP for exposed ports and vulnerabilities.
install
source · Clone the upstream repo
git clone https://github.com/openclaw/skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/openclaw/skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/assix/home-network-security-agent" ~/.claude/skills/openclaw-skills-homenetworksecurityagent && rm -rf "$T"
OpenClaw · Install into ~/.openclaw/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/openclaw/skills "$T" && mkdir -p ~/.openclaw/skills && cp -r "$T/skills/assix/home-network-security-agent" ~/.openclaw/skills/openclaw-skills-homenetworksecurityagent && rm -rf "$T"
manifest:
skills/assix/home-network-security-agent/SKILL.mdsource content
HomeNetworkSecurityAgent
This agent performs internal and external security audits of your home network environment. It utilizes
nmap to discover devices and footprint exposed services.
Setup
Ensure
nmap is installed on the host system:
sudo apt install nmap
User Instructions
- "Scan my local network and tell me what devices are online."
- "Find my public IP and gateway, then check if my gateway management ports (like 8443, 443) or DNS resolvers (like port 53) are exposed to the outside."
- "Run a deep vulnerability scan on my router to see if it needs a firmware update."
Tools
get_network_topology
get_network_topologyRetrieves the default gateway IP and the external public IP address of the network.
- Inputs: None
- Call:
python3 scanner.py --tool get_network_topology
discover_lan_hosts
discover_lan_hostsPerforms a ping sweep on the local subnet to identify all connected physical and IoT devices.
- Inputs:
(string)gateway_ip - Call:
python3 scanner.py --tool discover_lan_hosts --target {{gateway_ip}}
scan_ports_and_vulns
scan_ports_and_vulnsRuns a service detection scan against a target IP (local or public) to list open ports and identify potential misconfigurations.
- Inputs:
(string),ip_address
(string: "fast" or "deep")scan_type - Call:
python3 scanner.py --tool scan_ports_and_vulns --target {{ip_address}} --type {{scan_type}}