Nmap
v1.0.0Nmap reference tool. Use when working with nmap in devtools contexts.
⭐ 0· 127·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill is presented as a reference/cheatsheet for 'nmap' and includes a local script that prints documentation. It does not request unrelated credentials or tooling. (Minor note: the skill name matches the well-known 'nmap' binary and could be confusing, but that is a naming/collision issue, not an incoherence between purpose and requirements.)
Instruction Scope
SKILL.md instructs the agent to run scripts/script.sh with specific subcommands. The script only prints static documentation and does not read arbitrary files, call external endpoints, or access environment variables beyond normal shell behavior.
Install Mechanism
There is no install spec (instruction-only with one bundled script). No downloads or archive extraction occur, and nothing is written to unexpected system locations.
Credentials
The skill declares no required environment variables, credentials, or config paths and the runtime script does not attempt to access secrets or external services.
Persistence & Privilege
always is false and the skill does not request persistent system presence or modify other skills or system-wide configurations.
Assessment
This skill is a local, read-only reference implemented as a shell script and appears safe to install from a permissions/credential perspective. Before installing: (1) be aware the skill is named 'nmap' which could be mistaken for or collide with the system nmap binary — confirm how your agent resolves skill invocations; (2) inspect the bundled script yourself if you want to confirm there are no unexpected commands; (3) if you operate in a highly restrictive environment, run the skill in a sandbox first. There are no network downloads, no credentials requested, and no evidence of data exfiltration in the provided files.Like a lobster shell, security has layers — review code before you run it.
latestvk97f8s2fcmyfk55pvzb8rbp2th83fzwx
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
