Netping
v3.0.0Check connectivity with ping, port scan, and DNS lookup in one fast tool. Use when testing reachability, scanning ports, resolving DNS records quickly.
⭐ 0· 242·0 current·0 all-time
byBytesAgain2@ckchzh
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill is a network diagnostic tool and the included Bash script implements ping, port checks, traceroute, DNS lookups, latency, HTTP checks, and a ping sweep — this aligns with the name/description. Note: registry metadata earlier lists "Required binaries: none" while SKILL.md and the script require standard network utilities (ping, dig/nslookup, traceroute/tracepath, curl, bash /dev/tcp). That mismatch is an informational inconsistency (might cause runtime failures) but not a security concern.
Instruction Scope
SKILL.md and the script limit actions to network diagnostics using local system tools and do not instruct reading unrelated files or exporting environment variables. The script may perform many network probes (port checks, /24 ping sweep), which is expected for this purpose.
Install Mechanism
No install spec or remote downloads are used; the skill ships a local Bash script. Nothing in the package pulls code from external URLs or executes downloaded artifacts.
Credentials
The skill does not request environment variables, credentials, or config paths. All operations use local system utilities and network probes consistent with its stated function.
Persistence & Privilege
The skill does not request always:true, does not alter other skills or system-wide agent settings, and is user-invocable only — no elevated persistence or privilege is requested.
Assessment
This skill is coherent with its stated purpose, but review the script before running. It runs local networking utilities and performs active probes (port checks and a /24 ping sweep) which can be noisy or trigger IDS/IPS and may be disallowed on some networks — get permission before scanning networks you don't own. Ensure required tools (ping, dig/nslookup, traceroute/tracepath, curl) are available on the host; the registry metadata not listing these could cause runtime errors. If you need to restrict behavior, run the script in a controlled environment or modify it to limit scan ranges and timeouts.Like a lobster shell, security has layers — review code before you run it.
latestvk9779s7np8aapy86wkkjthw2hn837xnb
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
