Network Scan

PassAudited by ClawScan on May 10, 2026.

Overview

This is a straightforward nmap-based network scanner, but users should only scan networks they are authorized to test and may need to install undeclared nmap dependencies.

Install only if you need an nmap wrapper and understand that it sends real network probes. Limit scans to authorized systems, avoid broad CIDR ranges unless necessary, and verify the required nmap dependencies from trusted sources.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running scans against networks you do not own or administer can trigger alerts, disrupt services, or violate policies or laws.

Why it was flagged

The skill is explicitly designed to perform active network scans over potentially broad target ranges. This is purpose-aligned, but users should ensure they have authorization for every target.

Skill content
This skill scans ports and devices on a network using nmap. It supports various target formats, including CIDR notation, IP ranges, and comma-separated lists.
Recommendation

Use the skill only for networks and hosts you are authorized to scan, and prefer narrow targets, host limits, and timeouts.

What this means

The skill may fail until nmap and the Python nmap module are installed, and users must rely on manual setup.

Why it was flagged

The code depends on the python-nmap module and the nmap binary, while the registry metadata and install specification do not declare required binaries or setup steps.

Skill content
import nmap ... scanner = nmap.PortScanner() ... return {"error": "nmap program was not found. Please install nmap."}
Recommendation

Before using it, verify and install nmap and python-nmap from trusted sources; the publisher should declare these dependencies in metadata or an install spec.