Network Security Scanner
Identifies vulnerabilities and misconfigurations across network devices and cloud infrastructure using automated scanning techniques.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add network-security-scanner npx -- -y @trustedskills/network-security-scanner
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"network-security-scanner": {
"command": "npx",
"args": [
"-y",
"@trustedskills/network-security-scanner"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
The network-security-scanner skill assesses the security posture of a given network or system. It identifies potential vulnerabilities and misconfigurations, providing insights into areas requiring attention. This includes scanning for open ports, identifying running services, and detecting known security flaws. The scanner aims to provide actionable data to improve overall network resilience.
When to use it
- Pre-deployment Security Check: Before launching a new application or service, scan the underlying infrastructure to identify potential weaknesses.
- Regular Vulnerability Assessments: Schedule periodic scans to proactively detect newly discovered vulnerabilities and ensure ongoing security.
- Incident Response: Following a suspected breach, quickly assess affected systems for compromised status and potential attack vectors.
- Compliance Audits: Generate reports demonstrating adherence to security standards and regulations by identifying areas of non-compliance.
Key capabilities
- Port scanning
- Service identification
- Vulnerability detection
- Reporting
Example prompts
- "Scan the network at 192.168.1.10 for open ports."
- "Perform a vulnerability assessment on example.com and report any findings."
- "Identify running services on host 10.0.0.5."
Tips & gotchas
The scanner requires appropriate network access permissions to function correctly. Results should be interpreted by security professionals, as false positives can occur.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.