Vulnerability Scanning
This tool scans for potential weaknesses in your systems and applications, proactively identifying security risks to protect your data.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add bagelhole-vulnerability-scanning npx -- -y @trustedskills/bagelhole-vulnerability-scanning
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"bagelhole-vulnerability-scanning": {
"command": "npx",
"args": [
"-y",
"@trustedskills/bagelhole-vulnerability-scanning"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
The bagelhole-vulnerability-scanning skill allows AI agents to perform vulnerability scans on specified targets. It identifies potential security weaknesses in systems and applications, providing reports detailing discovered vulnerabilities. This helps proactively address risks before they can be exploited.
When to use it
- Security Audits: Regularly scan infrastructure or application code for known vulnerabilities as part of a scheduled audit process.
- New Deployments: Scan newly deployed environments or applications to ensure security best practices are followed from the start.
- Incident Response: Quickly assess systems potentially affected by a security incident to identify exploited vulnerabilities.
- DevOps Pipelines: Integrate vulnerability scanning into CI/CD pipelines for automated security checks during development and deployment.
Key capabilities
- Vulnerability Scanning
- Target Specification
- Report Generation
Example prompts
- "Scan the server at 192.168.1.100 for vulnerabilities."
- "Generate a vulnerability report for our application deployed on AWS."
- "Perform a scan of this Docker image:
my-app:latestand summarize the findings."
Tips & gotchas
The skill requires appropriate credentials to access and scan target systems. Ensure proper authentication is configured before initiating scans, as unauthorized scanning can be illegal or disruptive.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.