ring-security

by BytesAgain

Control Ring doorbells and cameras from the terminal. Use when scanning motion events, auditing device access, checking firmware, reporting activity.

3.7k安全与合规未扫描2026年3月23日

安装

claude skill add --url github.com/openclaw/skills/tree/main/skills/bytesagain1/ring-security

文档

Ring Security

Security scanning and hardening tool for auditing systems, generating reports, and enforcing compliance from the command line.

Overview

ring-security provides a suite of security-focused commands for vulnerability scanning, compliance auditing, encryption helpers, password generation, and hardening guidance. All operations are local and logged for traceability.

Commands

CommandDescription
ring-security scanRun a vulnerability scan
ring-security auditExecute a security audit checklist
ring-security check <target>Quick security check on a specific target
ring-security reportGenerate a security report
ring-security hardenDisplay hardening steps (Update → Firewall → Auth)
ring-security encrypt <file>Encryption helper for a given file or string
ring-security hash <string>Generate SHA-256 hash of a string
ring-security passwordGenerate a random 16-character password
ring-security complianceShow compliance checklist (Access controls, Encryption, Logging)
ring-security alertsCheck for active security alerts
ring-security helpShow help message
ring-security versionShow version (v2.0.0)

Data Storage

  • Location: $RING_SECURITY_DIR or ~/.local/share/ring-security/
  • Data file: data.log — general operation log
  • History: history.log — timestamped action log for audit trail
  • All data is plain text, stored locally. No cloud services required.

Requirements

  • bash (with set -euo pipefail)
  • python3 (standard library only — used for password generation via random and string)
  • Standard Unix utilities (sha256sum, date, echo)
  • No external API keys or accounts needed

When to Use

  1. Quick vulnerability scanning — Run scan to identify potential security issues on a system
  2. Security audits — Use audit to walk through a checklist of security controls
  3. Password generation — Generate strong random passwords with password — 16 chars with letters, digits, and symbols
  4. Compliance reviews — Use compliance to check Access Controls, Encryption, and Logging status
  5. System hardening — Follow the harden guide for a step-by-step approach: Update → Firewall → Auth

Examples

bash
# Run a full vulnerability scan
ring-security scan

# Perform a security audit
ring-security audit

# Quick check on a specific target
ring-security check "web-server-01"

# Generate a security report
ring-security report
bash
# Get hardening guidance
ring-security harden
#  Output: Step 1: Update | Step 2: Firewall | Step 3: Auth

# Generate a random password
ring-security password
#  Output: e.g. "aB3!xK9mQ2@nP7wL"

# Hash a string with SHA-256
ring-security hash "my-secret-value"
#  Output: SHA-256 hash of the input
bash
# Check compliance status
ring-security compliance
#  Output: [ ] Access controls | [ ] Encryption | [ ] Logging

# Check for active security alerts
ring-security alerts

# Encrypt a file
ring-security encrypt "sensitive-data.txt"

How It Works

Each command performs its security operation and logs the action with a timestamp to history.log. The hash command uses sha256sum for real cryptographic hashing. The password command leverages Python's random and string modules to generate 16-character passwords mixing uppercase, lowercase, digits, and special characters (!@#).

Tips

  • Pipe hash output for scripting: ring-security hash "value" | xargs echo
  • Use report in a cron job for regular security summaries
  • Override the data directory: export RING_SECURITY_DIR=/path/to/custom/dir
  • Combine scan and audit in a daily cron for automated security monitoring

Powered by BytesAgain | bytesagain.com | hello@bytesagain.com

相关 Skills

安全专家

by alirezarezvani

Universal
热门

覆盖威胁建模、漏洞评估、安全架构设计、代码审计与渗透测试,内置 STRIDE、OWASP、加密模式和安全扫描流程,适合系统设计评审与上线前安全排查。

安全专家把威胁建模、漏洞分析到渗透测试串成一套流程,内置 STRIDE 与 OWASP 指南,做安全设计和排查更省心。

安全与合规
未扫描9.0k

安全运营

by alirezarezvani

Universal
热门

覆盖应用安全、漏洞管理与合规审计,支持代码/依赖扫描、CVE 评估、Secrets 检测和安全自动化,适合做安全基线落地、漏洞响应、审计检查与安全开发治理。

应用安全、漏洞管理和合规检查一套打通,还能自动化扫描与响应,帮团队更早发现并收敛风险。

安全与合规
未扫描9.0k

安全审计

by alirezarezvani

Universal
热门

安装前审计 Claude Code Skill 的代码执行、Prompt 注入和依赖供应链风险,支持本地目录或 Git 仓库扫描,输出 PASS/WARN/FAIL 结论及修复建议

把代码审查、漏洞扫描和合规检查串成一条线,帮团队更早发现风险,做安全治理更省心。

安全与合规
未扫描9.0k

相关 MCP 服务

搜索和分析 Sentry 错误报告,辅助调试。

把零散的 Sentry 错误报告变成可检索线索,帮你在海量报错里更快定位线上故障,排障调试明显省时。

安全与合规
616

为 AI agents 提供安全层:拦截 prompt injection、识别伪造 packages,并扫描漏洞风险。

给 AI Agent 补上关键安全层,能拦截 prompt 注入、识别伪造包并扫描漏洞风险,把防护前置更省心。

安全与合规
92

强化安全性的 NotebookLM MCP,集成 post-quantum encryption,提升数据防护能力。

安全与合规
47

评论