Network Scanner

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernHigh Confidence
ASI05: Unexpected Code Execution
What this means

A crafted DNS server or target value could cause the agent to run commands on the user's machine instead of only scanning the network.

Why it was flagged

The script runs shell commands and directly interpolates DNS server and CIDR values that the SKILL.md documents as user/configurable inputs. Shell metacharacters in those values could execute unintended local commands.

Skill content
result = subprocess.run(cmd, shell=True, capture_output=True, text=True, timeout=timeout)
...
cmd += f" @{dns_server}"
...
nmap_cmd = f"{sudo}nmap -sn -oX - {cidr} 2>/dev/null"
Recommendation

Replace shell=True with argument lists, validate DNS/CIDR values with ipaddress or equivalent parsing, and reject values containing shell syntax.

ConcernMedium Confidence
ASI02: Tool Misuse and Exploitation
What this means

The scanner could accidentally attempt broader scans than expected or hang/crash on very large network ranges.

Why it was flagged

The advertised public-network protection checks only the first host rather than the whole CIDR and materializes all hosts before blocking. Unusual or very large CIDRs could bypass intended bounds or consume excessive resources.

Skill content
network = ipaddress.ip_network(cidr, strict=False)
# Get first host IP (skip network address)
test_ip = str(list(network.hosts())[0]) if network.num_addresses > 1 else str(network.network_address)
...
if not test_ip_obj.is_private:
Recommendation

Validate the entire target network, cap allowed CIDR sizes, avoid list(network.hosts()), and require explicit confirmation for large or configured-trusted ranges.

What this means

Running scans with sudo may expose more local network information and can increase harm if command handling is abused.

Why it was flagged

Elevated privileges are disclosed and are purpose-aligned for ARP/MAC discovery, but they increase the impact of mistakes or unsafe command construction.

Skill content
- `sudo` access recommended for MAC address discovery
Recommendation

Use --no-sudo unless MAC addresses are needed, and only run sudo scans for networks you own or administer.