Tech Security Audit
Performs local network scans using Nmap to detect vulnerabilities, identify service versions, and fingerprint operating systems.
Exact detection thresholds for identifying malicious network patterns including port scans, DoS attacks, and beaconing behavior.
This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.
Install skill "threat-detection" with this command: npx skills add dapt-intrusion-detection-threat-detection
This source entry does not include full markdown content beyond metadata.
This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.
Related by shared tags or category signals.
Performs local network scans using Nmap to detect vulnerabilities, identify service versions, and fingerprint operating systems.
AI security system for protecting agents from prompt injection, data leakage, and dangerous commands
Architect, deploy, and optimize AWS infrastructure avoiding cost explosions and security pitfalls.
Transform any AI into a professional executive assistant with battle-tested personas and workflows. Complete templates for Google Workspace integration (Gmail, Calendar, Drive), milestone delivery system, and security guidelines.