Network Security Audit

v1.0.0

Professional network security assessment and gap analysis platform generating comprehensive audit reports across security domains and compliance frameworks.

0· 78·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the content: SKILL.md and openapi.json describe generating audit reports across 12 domains. However, this is an instruction-only/specification artifact with no implementation or server URL included — it appears to be a local/template spec rather than an integration with an external hosted service.
Instruction Scope
Runtime instructions and examples limit themselves to receiving assessment data and producing audit results. There are no instructions to read unrelated files, environment variables, or to transmit data to external endpoints beyond the described API (which itself has no server host).
Install Mechanism
No install specification or code is included; the skill is instruction-only so nothing is written to disk or fetched during install.
Credentials
The skill declares no required environment variables, credentials, or config paths; there is no disproportionate request for secrets or external credentials.
Persistence & Privilege
The skill is not always-enabled and does not request elevated persistence. Model invocation is allowed (the platform default) but there is no evidence this skill attempts to modify other skills or system-wide settings.
Assessment
This is essentially an API/spec template and example input/output for producing audit reports rather than a runnable integration. Before installing or using it: confirm where the audit computation runs (locally in the agent vs. an external service) and get the service host or source code if you expect network calls; avoid sending real sensitive assessment data until you know whether data will be transmitted off your environment; if you need a runnable tool, request the implementation (server code or client) or a verified source/homepage.

Like a lobster shell, security has layers — review code before you run it.

latestvk973ss9w2jz68xhexprmtgt9px83vpk9

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments