ring-security
by BytesAgain
Control Ring doorbells and cameras from the terminal. Use when scanning motion events, auditing device access, checking firmware, reporting activity.
安装
claude skill add --url github.com/openclaw/skills/tree/main/skills/bytesagain1/ring-security文档
Ring Security
Security scanning and hardening tool for auditing systems, generating reports, and enforcing compliance from the command line.
Overview
ring-security provides a suite of security-focused commands for vulnerability scanning, compliance auditing, encryption helpers, password generation, and hardening guidance. All operations are local and logged for traceability.
Commands
| Command | Description |
|---|---|
ring-security scan | Run a vulnerability scan |
ring-security audit | Execute a security audit checklist |
ring-security check <target> | Quick security check on a specific target |
ring-security report | Generate a security report |
ring-security harden | Display hardening steps (Update → Firewall → Auth) |
ring-security encrypt <file> | Encryption helper for a given file or string |
ring-security hash <string> | Generate SHA-256 hash of a string |
ring-security password | Generate a random 16-character password |
ring-security compliance | Show compliance checklist (Access controls, Encryption, Logging) |
ring-security alerts | Check for active security alerts |
ring-security help | Show help message |
ring-security version | Show version (v2.0.0) |
Data Storage
- Location:
$RING_SECURITY_DIRor~/.local/share/ring-security/ - Data file:
data.log— general operation log - History:
history.log— timestamped action log for audit trail - All data is plain text, stored locally. No cloud services required.
Requirements
- bash (with
set -euo pipefail) - python3 (standard library only — used for password generation via
randomandstring) - Standard Unix utilities (
sha256sum,date,echo) - No external API keys or accounts needed
When to Use
- Quick vulnerability scanning — Run
scanto identify potential security issues on a system - Security audits — Use
auditto walk through a checklist of security controls - Password generation — Generate strong random passwords with
password— 16 chars with letters, digits, and symbols - Compliance reviews — Use
complianceto check Access Controls, Encryption, and Logging status - System hardening — Follow the
hardenguide for a step-by-step approach: Update → Firewall → Auth
Examples
# Run a full vulnerability scan
ring-security scan
# Perform a security audit
ring-security audit
# Quick check on a specific target
ring-security check "web-server-01"
# Generate a security report
ring-security report
# Get hardening guidance
ring-security harden
# Output: Step 1: Update | Step 2: Firewall | Step 3: Auth
# Generate a random password
ring-security password
# Output: e.g. "aB3!xK9mQ2@nP7wL"
# Hash a string with SHA-256
ring-security hash "my-secret-value"
# Output: SHA-256 hash of the input
# Check compliance status
ring-security compliance
# Output: [ ] Access controls | [ ] Encryption | [ ] Logging
# Check for active security alerts
ring-security alerts
# Encrypt a file
ring-security encrypt "sensitive-data.txt"
How It Works
Each command performs its security operation and logs the action with a timestamp to history.log. The hash command uses sha256sum for real cryptographic hashing. The password command leverages Python's random and string modules to generate 16-character passwords mixing uppercase, lowercase, digits, and special characters (!@#).
Tips
- Pipe
hashoutput for scripting:ring-security hash "value" | xargs echo - Use
reportin a cron job for regular security summaries - Override the data directory:
export RING_SECURITY_DIR=/path/to/custom/dir - Combine
scanandauditin a daily cron for automated security monitoring
Powered by BytesAgain | bytesagain.com | hello@bytesagain.com
相关 Skills
安全专家
by alirezarezvani
覆盖威胁建模、漏洞评估、安全架构设计、代码审计与渗透测试,内置 STRIDE、OWASP、加密模式和安全扫描流程,适合系统设计评审与上线前安全排查。
✎ 安全专家把威胁建模、漏洞分析到渗透测试串成一套流程,内置 STRIDE 与 OWASP 指南,做安全设计和排查更省心。
安全运营
by alirezarezvani
覆盖应用安全、漏洞管理与合规审计,支持代码/依赖扫描、CVE 评估、Secrets 检测和安全自动化,适合做安全基线落地、漏洞响应、审计检查与安全开发治理。
✎ 应用安全、漏洞管理和合规检查一套打通,还能自动化扫描与响应,帮团队更早发现并收敛风险。
安全审计
by alirezarezvani
安装前审计 Claude Code Skill 的代码执行、Prompt 注入和依赖供应链风险,支持本地目录或 Git 仓库扫描,输出 PASS/WARN/FAIL 结论及修复建议
✎ 把代码审查、漏洞扫描和合规检查串成一条线,帮团队更早发现风险,做安全治理更省心。
相关 MCP 服务
by Sentry
搜索和分析 Sentry 错误报告,辅助调试。
✎ 把零散的 Sentry 错误报告变成可检索线索,帮你在海量报错里更快定位线上故障,排障调试明显省时。
by sinewaveai
为 AI agents 提供安全层:拦截 prompt injection、识别伪造 packages,并扫描漏洞风险。
✎ 给 AI Agent 补上关键安全层,能拦截 prompt 注入、识别伪造包并扫描漏洞风险,把防护前置更省心。
by pantheon-security
强化安全性的 NotebookLM MCP,集成 post-quantum encryption,提升数据防护能力。