Space Query Skill

v1.0.0

Build search queries for network asset discovery platforms (space测绘). Use when users want to find network assets, discover attack surfaces, investigate vulne...

0· 31·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
Name/description match the SKILL.md and resource files: the repository contains templates, field mappings, and CVE query guidance for FOFA, Quake, ZoomEye, and Shodan. No unexpected binaries, env vars, or installs are requested, which is proportionate for an instruction-only query builder.
Instruction Scope
Instructions remain within the stated purpose (build and translate queries). The runtime guidance explicitly directs the agent to perform web searches (platform blogs, NVD, GitHub PoCs) to extract official product identifiers. That behavior is coherent for accurate CVE-to-query translation but can surface PoC/exploit content—agents may retrieve or summarize external exploit information if given permission to web-search and fetch content.
Install Mechanism
No install spec and no code files that run on install. Being instruction-only means nothing is downloaded or written to disk by the skill itself, which is the lowest-risk install model.
Credentials
The skill declares no required environment variables, credentials, or config paths. The guidance does reference external platform docs and APIs but does not require the user's platform credentials—environment/credential requests are proportionate (none).
Persistence & Privilege
always:false and default autonomous invocation are set. The skill does not request permanent/always-on presence nor does it attempt to modify other skills or system-wide settings. Autonomous invocation is the platform default and not, on its own, concerning.
Assessment
This skill is internally consistent: it provides templates and translation rules for building queries on FOFA, Quake, ZoomEye, and Shodan and does not request credentials or install code. Before installing, consider: 1) The skill recommends web searches and GitHub PoCs — those sources can include exploit code or detailed instructions for attacking systems. Ensure you (and your organization) have legal authorization before using the queries against any target. 2) Because the agent may fetch external pages, confirm you want the agent to have web access and be comfortable with it retrieving third-party content. 3) Review any generated queries before running them on these platforms to avoid unintended scanning or policy violations. 4) If you need provenance, prefer skills with a verifiable upstream repository and maintainer rather than an unknown source.

Like a lobster shell, security has layers — review code before you run it.

latestvk97c2mmepk303779f7ds2ne5x584617a

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments