install
source · Clone the upstream repo
git clone https://github.com/openclaw/skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/openclaw/skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/apacheua/network-scan" ~/.claude/skills/openclaw-skills-network-scan && rm -rf "$T"
OpenClaw · Install into ~/.openclaw/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/openclaw/skills "$T" && mkdir -p ~/.openclaw/skills && cp -r "$T/skills/apacheua/network-scan" ~/.openclaw/skills/openclaw-skills-network-scan && rm -rf "$T"
manifest:
skills/apacheua/network-scan/SKILL.mdsource content
network-scan
Description
This skill scans ports and devices on a network using nmap. It supports various target formats, including CIDR notation, IP ranges, and comma-separated lists. Defaults to quick scan for CIDR.
Inputs
: The target network or IP address to scan (e.g., 192.168.1.0/24, 192.168.1.1-192.168.1.10, 192.168.1.1,192.168.1.2).target
: The ports to scan (e.g., 80,443).ports
: (Optional) Scan only the top 10 ports.--quick
: (Optional) Use aggressive scan settings (nmap -T4).--fast
: (Optional) Set a timeout in seconds for the scan (default: 30).--timeout
: (Optional) Scan the top N most common ports (e.g., --top-ports 100).--top-ports
: (Optional) Limit the number of hosts to scan (e.g., --hosts-limit 50).--hosts-limit
: (Optional) Exclude a specific IP address from the scan (e.g., --exclude 192.168.1.5).--exclude
Outputs
JSON object containing the nmap scan results. Includes scan results, nmap command used, and scan information.
Usage
To use this skill, call it with the
target and ports parameters:
network-scan target=192.168.1.0/24 ports=80,443 --fast --timeout 60 --hosts-limit 50 --exclude 192.168.1.100