space-query-skill

Build search queries for network asset discovery platforms (space测绘). Use when users want to find network assets, discover attack surfaces, investigate vulnerabilities (CVE), or search for specific services/servers/websites. Triggers on: 空间测绘, FOFA, 鹰图, ZoomEye, Shodan, CVE, 漏洞, asset discovery, network search, or similar queries.

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "space-query-skill" with this command: npx skills add gandli/space-query-skill

Space Query Skill

Multi-platform query builder for FOFA, Quake, ZoomEye, and Shodan.

Quick Start

  1. Detect platform — Use specified platform or ask user
  2. Analyze intent — What to find, where, attributes, exclusions
  3. Build query — Apply correct syntax for the platform
  4. Present result — Use the output format below

Platform Selection

PlatformBest ForSyntax Style
FOFAGlobal coverage, protocol detailsfield="value"
Quake (鹰图)China data, threat intelfield:value
ZoomEyeService fingerprintsfield:value
ShodanIoT,漏洞关联field:value

Core Patterns

Pattern 1: Exposed Service

FOFA:   product="Redis" && port="6379" && country="CN"
Quake:  app:Redis AND port:6379 AND country:China
Shodan: product:Redis port:6379 country:CN

Pattern 2: Login Page

FOFA:   (title="登录" || title="admin" || title="后台") && country="CN"
Quake:  (keyword:登录 OR keyword:admin) AND country:China
Shodan: title:"login" country:CN

Pattern 3: File Upload

FOFA:   (body="plupload" || body="webuploader" || title="上传") && country="CN"
Shodan: http.html:"type=\"file\"" country:CN

Pattern 4: SSL Certificate Issue

FOFA:   cert.is_expired=true && country="CN"
Shodan: ssl.cert.expired:true country:CN

Pattern 5: CVE/Vulnerability Search

Critical: Always extract features from CVE info and use platform-specific product identifiers.

CVE Query Workflow

┌─────────────────────────────────────────────────────────────┐
│  Step 1: WebSearch for official queries                    │
│  Search: "[Platform] CVE-XXXX-XXXX" or "[CVE] + FOFA"  │
└─────────────────────────┬───────────────────────────────────┘
                          ▼
┌─────────────────────────────────────────────────────────────┐
│  Step 2: Find official source                               │
│  - Platform blog (en.fofa.info, quake.360.net/blog)     │
│  - Security sites (securityonline.info, nvd.nist.gov)     │
│  - GitHub PoC repos often contain platform queries         │
└─────────────────────────┬───────────────────────────────────┘
                          ▼
┌─────────────────────────────────────────────────────────────┐
│  Step 3: Extract platform-specific product ID               │
│  - FOFA uses app="product-name"                            │
│  - Quake uses app:product-name                             │
│  - Shodan uses product:product-name                        │
└─────────────────────────┬───────────────────────────────────┘
                          ▼
┌─────────────────────────────────────────────────────────────┐
│  Step 4: Build query                                       │
└─────────────────────────────────────────────────────────────┘

How to Find Official Sources

When given a CVE, ALWAYS use WebSearch first:

# Search for platform-specific queries
web_search: "CVE-2024-38819 FOFA query"
web_search: "CVE-2024-38819 fofa.info"
web_search: "CVE-2024-38819 Quake 360"
web_search: "CVE-2024-38819 PoC github"

# Search for official platform announcements
web_search: "site:en.fofa.info CVE-2024-38819"
web_search: "site:quake.360.net CVE"

Official Sources to Check:

SourceURLWhat to Find
FOFA Blogen.fofa.infoOfficial queries with exact app IDs
Quake Blogquake.360.net/blogThreat intel announcements
NVDnvd.nist.govCVE details, affected products
SecurityOnlinesecurityonline.infoPoC with platform queries
GitHubgithub.comPoC exploits often include FOFA/Quake queries

Example - CVE-2024-38819

Step 1: WebSearch

Search: "CVE-2024-38819 FOFA"
Result: en.fofa.info shows "app="vmware-Spring-Framework""

Step 2: Official Query Found

FOFA: app="vmware-Spring-Framework"  (25k+ results)

Step 3: Cross-platform translation

FOFA:   app="vmware-Spring-Framework"
Shodan: product:"Spring Framework"
Quake:  app:Spring
ZoomEye: app:spring

Wrong vs Correct Approach

Wrong (lazy):

body="CVE-2024-38819"     ❌ CVE ID in body, no results
product="Spring"           ❌ Wrong product ID for most platforms

Correct (official product ID):

app="vmware-Spring-Framework"  ✅ FOFA official query

Verified CVE Query Table

CVEAffectsFOFAShodanQuake
CVE-2024-38819Spring Frameworkapp="vmware-Spring-Framework"product:"Spring Framework"app:Spring
CVE-2021-44228Apache Log4japp="Apache-log4j2"product:log4japp:log4j
CVE-2019-0708Windows RDPapp="Microsoft-RDP"vuln:CVE-2019-0708app:RDP
CVE-2022-22965Spring4Shellapp="vmware-Spring-Framework"product:Springapp:Spring

Rule: When you find an official query from a trusted source (platform blog, security site, verified PoC), use that exact query.

Operator Precedence

() > == > = > != > && > ||

Rule: Always wrap multiple OR conditions with ().

Output Format

Present queries using this structure:

## Query

**Platform:** [Platform]

[Query Here]


### Explanation
- **Target:** What this finds
- **Fields:** Main fields used
- **Logic:** AND/OR relationship

### Suggestions
- Additional filters to consider
- Known limitations
- Alternative approaches

Field Reference

See resources/fields.md for complete field lists per platform.

Important Notes

  1. Parentheses(A || B) && C not A || B && C
  2. Platform syntax differs — FOFA uses =" while others use :
  3. Chinese charscountry="中国" works in FOFA, prefer English elsewhere
  4. Time filteringafter/before in FOFA/Quake

Troubleshooting

IssueSolution
No resultsAdd status_code="200" or remove strict filters
Too many resultsAdd country, time, or product filters
Wrong syntaxCheck platform in reference files

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

GigaChat (Sber AI) Proxy

Integrate GigaChat (Sber AI) with OpenClaw via gpt2giga proxy

Registry SourceRecently Updated
3600smvlx
General

TencentCloud Video Face Fusion

通过提取两张人脸核心特征并实现自然融合,支持多种风格适配,提升创意互动性和内容传播力,广泛应用于创意营销、娱乐互动和社交分享场景。

Registry SourceRecently Updated
General

TencentCloud Image Face Fusion

图片人脸融合(专业版)为同步接口,支持自定义美颜、人脸增强、牙齿增强、拉脸等参数,最高支持8K分辨率,有多个模型类型供选择。

Registry SourceRecently Updated
General

YoudaoNote News

有道云笔记资讯推送:基于收藏笔记分析关注话题,推送最新相关资讯。支持对话触发与每日定时推送(如早上9点)。触发词:资讯推送、设置资讯推送、生成资讯推送。

Registry SourceRecently Updated
1.5K1lephix