Network Scan
PassAudited by ClawScan on May 10, 2026.
Overview
This is a straightforward nmap-based network scanner, but users should only scan networks they are authorized to test and may need to install undeclared nmap dependencies.
Install only if you need an nmap wrapper and understand that it sends real network probes. Limit scans to authorized systems, avoid broad CIDR ranges unless necessary, and verify the required nmap dependencies from trusted sources.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Running scans against networks you do not own or administer can trigger alerts, disrupt services, or violate policies or laws.
The skill is explicitly designed to perform active network scans over potentially broad target ranges. This is purpose-aligned, but users should ensure they have authorization for every target.
This skill scans ports and devices on a network using nmap. It supports various target formats, including CIDR notation, IP ranges, and comma-separated lists.
Use the skill only for networks and hosts you are authorized to scan, and prefer narrow targets, host limits, and timeouts.
The skill may fail until nmap and the Python nmap module are installed, and users must rely on manual setup.
The code depends on the python-nmap module and the nmap binary, while the registry metadata and install specification do not declare required binaries or setup steps.
import nmap ... scanner = nmap.PortScanner() ... return {"error": "nmap program was not found. Please install nmap."}Before using it, verify and install nmap and python-nmap from trusted sources; the publisher should declare these dependencies in metadata or an install spec.
