Skills HomeNetworkSecurityAgent

Audits local network infrastructure, identifies active hosts, and scans the gateway/public IP for exposed ports and vulnerabilities.

install
source · Clone the upstream repo
git clone https://github.com/openclaw/skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/openclaw/skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/assix/home-network-security-agent" ~/.claude/skills/openclaw-skills-homenetworksecurityagent && rm -rf "$T"
OpenClaw · Install into ~/.openclaw/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/openclaw/skills "$T" && mkdir -p ~/.openclaw/skills && cp -r "$T/skills/assix/home-network-security-agent" ~/.openclaw/skills/openclaw-skills-homenetworksecurityagent && rm -rf "$T"
manifest: skills/assix/home-network-security-agent/SKILL.md
source content

HomeNetworkSecurityAgent

This agent performs internal and external security audits of your home network environment. It utilizes

nmap
to discover devices and footprint exposed services.

Setup

Ensure

nmap
is installed on the host system:

sudo apt install nmap

User Instructions

  • "Scan my local network and tell me what devices are online."
  • "Find my public IP and gateway, then check if my gateway management ports (like 8443, 443) or DNS resolvers (like port 53) are exposed to the outside."
  • "Run a deep vulnerability scan on my router to see if it needs a firmware update."

Tools

get_network_topology

Retrieves the default gateway IP and the external public IP address of the network.

  • Inputs: None
  • Call:
    python3 scanner.py --tool get_network_topology

discover_lan_hosts

Performs a ping sweep on the local subnet to identify all connected physical and IoT devices.

  • Inputs:
    gateway_ip
    (string)
  • Call:
    python3 scanner.py --tool discover_lan_hosts --target {{gateway_ip}}

scan_ports_and_vulns

Runs a service detection scan against a target IP (local or public) to list open ports and identify potential misconfigurations.

  • Inputs:
    ip_address
    (string),
    scan_type
    (string: "fast" or "deep")
  • Call:
    python3 scanner.py --tool scan_ports_and_vulns --target {{ip_address}} --type {{scan_type}}