PortCheck
by BytesAgain
Scan open ports and validate network services. Use when checking port availability, validating firewall rules, generating reports, linting configs.
安装
claude skill add --url github.com/openclaw/skills/tree/main/skills/bytesagain1/portcheck文档
PortCheck
A comprehensive devtools toolkit for checking, validating, formatting, linting, and analyzing port configurations and network services. Works entirely offline with local storage, zero configuration, and a clean command-line interface.
Why PortCheck?
- Works entirely offline — your data never leaves your machine
- 12 core network/devtools commands plus utility commands
- Simple command-line interface, no GUI needed
- Export to JSON, CSV, or plain text anytime
- Automatic history and activity logging with timestamps
Commands
| Command | Description |
|---|---|
portcheck check <input> | Check port availability, service status, or network configurations |
portcheck validate <input> | Validate firewall rules, network configs, or port mappings |
portcheck generate <input> | Generate port scan reports, firewall rule templates, or config files |
portcheck format <input> | Format network configuration files to consistent standards |
portcheck lint <input> | Lint firewall rules or network configs for common issues |
portcheck explain <input> | Explain port numbers, protocols, or network error messages |
portcheck convert <input> | Convert between configuration formats or port notation styles |
portcheck template <input> | Create or manage network configuration templates |
portcheck diff <input> | Diff firewall rules or network configurations |
portcheck preview <input> | Preview changes before applying to network configs |
portcheck fix <input> | Auto-fix common network configuration issues |
portcheck report <input> | Generate network analysis and port scan reports |
portcheck stats | Show summary statistics for all logged entries |
portcheck export <fmt> | Export data (json, csv, or txt) |
portcheck search <term> | Search across all logged entries |
portcheck recent | Show last 20 activity entries |
portcheck status | Health check — version, data dir, disk usage |
portcheck help | Show full help with all available commands |
portcheck version | Show current version (v2.0.0) |
Each core command (check, validate, generate, format, lint, explain, convert, template, diff, preview, fix, report) works in two modes:
- Without arguments: shows recent entries from that command's log
- With arguments: records the input with a timestamp and saves to the command-specific log file
Data Storage
All data is stored locally at ~/.local/share/portcheck/. Each command maintains its own .log file (e.g., check.log, validate.log, lint.log). A unified history.log tracks all activity across commands with timestamps. Use the export command to back up your data in JSON, CSV, or plain text format at any time.
Requirements
- Bash 4.0+ (uses
set -euo pipefail) - Standard Unix utilities:
date,wc,du,tail,grep,sed,cat,basename - No external dependencies or API keys required
- Works on Linux, macOS, and WSL
When to Use
- Pre-deployment port validation — Run
portcheck checkandportcheck validateto verify port availability and firewall rules before deploying services - Firewall rule auditing — Use
portcheck lintandportcheck reportto audit firewall configurations for security gaps or redundant rules - Network troubleshooting — Use
portcheck explainandportcheck diffto understand port conflicts, protocol issues, or configuration drift - Configuration management — Run
portcheck templateandportcheck generateto create standardized network configuration files across environments - Change management workflow — Use
portcheck preview,portcheck diff, andportcheck fixto safely review and apply network configuration changes
Examples
# Check if a port is available
portcheck check "prod-web-01:8080 — verify service is listening"
# Validate firewall rules
portcheck validate "iptables rules — ensure port 443 is open for HTTPS"
# Lint a network configuration
portcheck lint "nginx.conf — check for insecure port bindings"
# Generate a port scan report
portcheck generate "Full TCP scan report for 192.168.1.0/24"
# Explain a port number
portcheck explain "Port 3306 — what service uses this by default?"
# Diff two firewall configurations
portcheck diff "staging vs production iptables rules"
# View statistics across all commands
portcheck stats
# Export all data as JSON
portcheck export json
# Search for a specific term in all logs
portcheck search "443"
# Check system health
portcheck status
Output
All commands return structured text to stdout. Redirect to a file with portcheck <command> > output.txt. Exported files are saved to the data directory with the chosen format extension.
Configuration
The data directory defaults to ~/.local/share/portcheck/. The tool auto-creates this directory on first run.
Powered by BytesAgain | bytesagain.com | hello@bytesagain.com
相关 Skills
安全专家
by alirezarezvani
覆盖威胁建模、漏洞评估、安全架构设计、代码审计与渗透测试,内置 STRIDE、OWASP、加密模式和安全扫描流程,适合系统设计评审与上线前安全排查。
✎ 安全专家把威胁建模、漏洞分析到渗透测试串成一套流程,内置 STRIDE 与 OWASP 指南,做安全设计和排查更省心。
安全运营
by alirezarezvani
覆盖应用安全、漏洞管理与合规审计,支持代码/依赖扫描、CVE 评估、Secrets 检测和安全自动化,适合做安全基线落地、漏洞响应、审计检查与安全开发治理。
✎ 应用安全、漏洞管理和合规检查一套打通,还能自动化扫描与响应,帮团队更早发现并收敛风险。
安全审计
by alirezarezvani
安装前审计 Claude Code Skill 的代码执行、Prompt 注入和依赖供应链风险,支持本地目录或 Git 仓库扫描,输出 PASS/WARN/FAIL 结论及修复建议
✎ 把代码审查、漏洞扫描和合规检查串成一条线,帮团队更早发现风险,做安全治理更省心。
相关 MCP 服务
by Sentry
搜索和分析 Sentry 错误报告,辅助调试。
✎ 把零散的 Sentry 错误报告变成可检索线索,帮你在海量报错里更快定位线上故障,排障调试明显省时。
by sinewaveai
为 AI agents 提供安全层:拦截 prompt injection、识别伪造 packages,并扫描漏洞风险。
✎ 给 AI Agent 补上关键安全层,能拦截 prompt 注入、识别伪造包并扫描漏洞风险,把防护前置更省心。
by pantheon-security
强化安全性的 NotebookLM MCP,集成 post-quantum encryption,提升数据防护能力。