Scan Report
5 /100
network-device-scanner
扫描局域网内活跃设备及其开放端口,返回格式化Markdown表格
A legitimate network device scanner skill that performs local LAN scanning using standard tools (arp, ping, socket connections) with all capabilities properly declared in documentation.
Safe to install
Skill is safe to use. No security concerns identified.
Findings 1 items
| Severity | Finding | Location |
|---|---|---|
| Low | Hardcoded network range | scripts/scan.py:18 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | READ | READ | ✓ Aligned | scan.py:48-57 reads /proc/net/arp |
| Network | READ_WRITE | READ_WRITE | ✓ Aligned | scan.py:111-116 socket port scanning |
| Shell | WRITE | WRITE | ✓ Aligned | scan.py:33-34 subprocess arp/fping commands |
| Environment | NONE | READ | ✓ Aligned | scan.py:158 reads SCAN_EXTRA_IPS env var |
File Tree
4 files · 17.0 KB · 585 lines Python 1f · 294L
JavaScript 1f · 224L
Markdown 1f · 61L
Text 1f · 6L
├─
▾
scripts
│ ├─
scan.cjs
JavaScript
│ └─
scan.py
Python
├─
result.txt
Text
└─
SKILL.md
Markdown
Security Positives
✓ All shell commands (arp, fping, nmap, ping) are declared in SKILL.md
✓ No credential harvesting or sensitive file access
✓ No data exfiltration to external IPs
✓ No base64/eval/atob code execution patterns
✓ Port scanning is limited to predefined common ports (21,22,23,53,80,135,139,443,445,554,8000,8080,8443,9000,37777)
✓ Network operations scoped to local subnet only
✓ Python and JS implementations are consistent in behavior
✓ Timeout protection on all subprocess calls