Rey Network Scanner
Discover devices and scan ports on your local network using nmap with security-first defaults.
Why use this skill?
Safely discover devices and scan ports on your local network with the Rey Network Scanner. Identify vulnerabilities and map your LAN using nmap.
Install via CLI (Recommended)
clawhub install openclaw/skills/skills/sa9saq/rey-network-scannerWhat This Skill Does
The Rey Network Scanner is a powerful security-first utility designed for the OpenClaw AI agent to map local networks and identify exposed services. By wrapping the robust nmap engine, this skill allows the agent to perform host discovery, port enumeration, and service identification within a designated subnet. The skill is built with a strict security-first philosophy, ensuring that scans are limited to private IP ranges and helping users audit their own local infrastructure without accidentally targeting public or unauthorized systems. It provides structured output, allowing the AI to present complex scan data in an easy-to-read Markdown table, complete with automated security recommendations for common vulnerabilities like open Telnet or unencrypted FTP.
Installation
To integrate this utility, run the following command in your terminal: clawhub install openclaw/skills/skills/sa9saq/rey-network-scanner. Ensure that nmap is pre-installed on your host system using your platform's package manager (e.g., sudo apt install nmap for Debian/Ubuntu or brew install nmap for macOS). Once installed, the skill is immediately available to the agent for reconnaissance tasks.
Use Cases
This skill is perfect for home lab enthusiasts, system administrators, and security-conscious users. Use it when:
- You need to locate a specific device on your local network whose IP address has changed.
- You want to perform a routine security audit of your network to identify which services are exposed.
- You are verifying that a firewall or router configuration is correctly blocking or allowing traffic to specific ports.
- You are troubleshooting network connectivity issues where host discovery is needed to confirm device status.
Example Prompts
- "Rey, please scan my local 192.168.1.0/24 network and list all active devices and their open ports."
- "I need to check if my NAS at 192.168.1.50 has any insecure services like Telnet running. Can you perform a service detection scan?"
- "Run a quick host discovery scan on my current subnet to identify which devices are currently connected to the Wi-Fi."
Tips & Limitations
- Safety First: The skill is hard-coded to reject public IP ranges. Always confirm the target with the agent before execution to ensure you are only scanning networks you own.
- Performance: Large subnets (like /16) will take significantly longer to scan. When possible, narrow your scope to a /24 block for faster results.
- Privileges: While many scans run in user-space, OS detection typically requires sudo privileges. Be mindful of when the agent requests elevated permissions.
- Firewalls: Some devices ignore ICMP ping requests. If a host seems "down" but you know it is connected, ask the agent to use the
-Pnflag to skip host discovery.
Metadata
Not sure this is the right skill?
Describe what you want to build — we'll match you to the best skill from 16,000+ options.
Find the right skillPaste this into your clawhub.json to enable this plugin.
{
"plugins": {
"official-sa9saq-rey-network-scanner": {
"enabled": true,
"auto_update": true
}
}
}Tags(AI)
Flags: network-access, code-execution
Related Skills
threat-model
Threat modeling and attack scenario design. Identify risks before they become vulnerabilities. STRIDE, attack trees, risk matrix.
Sns Auto Poster
Schedule and automate social media posts to X/Twitter with cron-based queue management.
security-review
Comprehensive security review for code, configs, and operations. OWASP, prompt injection, crypto security. Auto-triggers on security-related changes.
Process Monitor
Monitor system processes, identify top CPU/memory consumers, and alert on resource thresholds.
Readme Generator
Auto-generate comprehensive README.md files by analyzing project structure and configuration.