Port Scanner

PassAudited by ClawScan on May 1, 2026.

Overview

This is a straightforward port-scanning helper with visible code; it probes network ports, so use it only on systems you are authorized to test.

The code matches the stated purpose and does not show hidden data access, persistence, or exfiltration. Before installing or using it, confirm that port scanning is permitted on the target systems and choose conservative scan ranges and concurrency settings.

Findings (1)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The skill can generate network probes to hosts and services, which may be inappropriate or disruptive if aimed at systems the user does not own or administer.

Why it was flagged

The script lets the user select network targets, port ranges, and concurrency, which is the advertised scanner functionality but can be misused against unauthorized systems.

Skill content
parser.add_argument("host", help="Target hostname or IP address") ... parser.add_argument("--ports", help="Ports to scan: single, range (1-1024), or comma-separated (22,80,443)") ... parser.add_argument("--workers", type=int, default=100
Recommendation

Use only on networks and systems where you have permission, and keep port ranges, timeout, and worker counts proportionate to the audit being performed.