Web Check
by bytesagain1
Analyze websites with OSINT reconnaissance and security scanning. Use when inspecting headers, checking DNS, analyzing SSL certs, generating reports.
安装
claude skill add --url github.com/openclaw/skills/tree/main/skills/bytesagain1/site-inspector文档
Site Inspector
Website analysis and OSINT reconnaissance toolkit. Inspect sites, log security checks, analyze results, and generate reports — all from the command line.
Commands
Run site-inspector <command> [args] to use.
| Command | Description |
|---|---|
run <input> | Run a site inspection and log the result |
check <input> | Check a specific URL or endpoint |
convert <input> | Convert inspection data between formats |
analyze <input> | Analyze site security or performance patterns |
generate <input> | Generate inspection templates or configs |
preview <input> | Preview an inspection configuration before running |
batch <input> | Batch process multiple sites at once |
compare <input> | Compare inspection results between sites or runs |
export <input> | Export logged data (also supports export <fmt> for json/csv/txt) |
config <input> | Save or view configuration entries |
status <input> | Log status entries (also runs health check with no args via utility) |
report <input> | Generate or log inspection reports |
stats | Show summary statistics across all log files |
search <term> | Search all entries for a keyword |
recent | Show the 20 most recent history entries |
help | Show help message |
version | Show version (v2.0.0) |
Each data command (run, check, convert, analyze, generate, preview, batch, compare, export, config, status, report) works in two modes:
- Without arguments — displays the 20 most recent entries from its log
- With arguments — saves the input with a timestamp to its dedicated log file
Data Storage
All data is stored in ~/.local/share/site-inspector/:
run.log,check.log,convert.log,analyze.log,generate.log,preview.log— per-command log filesbatch.log,compare.log,export.log,config.log,status.log,report.log— additional command logshistory.log— unified activity history across all commandsexport.json,export.csv,export.txt— generated export files
Set SITE_INSPECTOR_DIR environment variable to override the default data directory.
Requirements
- Bash 4+ with standard coreutils (
date,wc,du,tail,grep,sed) - No external dependencies — pure shell implementation
When to Use
- Website security audits — log and track OSINT reconnaissance findings for target sites
- DNS and header inspection — record DNS records, HTTP headers, and SSL certificate details
- Batch site analysis — process multiple domains or endpoints in one run
- Comparing site configurations — compare inspection results across different sites or time periods
- Generating security reports — produce structured reports from accumulated inspection data
Examples
# Run an inspection on a domain
site-inspector run "example.com headers=OK ssl=valid dns=resolved"
# Check a specific endpoint
site-inspector check "https://api.example.com/health status=200 latency=42ms"
# Analyze logged patterns
site-inspector analyze "ssl_expiry_trend: 3 certs expiring within 30 days"
# Batch inspect multiple sites
site-inspector batch "domains=25 scanned=25 issues_found=3"
# Compare two inspection runs
site-inspector compare "example.com run1 vs run2: headers changed, ssl renewed"
# Generate a report entry
site-inspector report "Weekly security audit - 15 domains - all clear"
# Export all data as JSON
site-inspector export json
# Search for entries about a specific domain
site-inspector search "api.example.com"
# View recent activity
site-inspector recent
# Show statistics
site-inspector stats
Output
All commands output results to stdout. Log entries are stored with timestamps in pipe-delimited format (YYYY-MM-DD HH:MM|value). Use export to convert all data to JSON, CSV, or plain text.
Powered by BytesAgain | bytesagain.com | hello@bytesagain.com
相关 Skills
安全专家
by alirezarezvani
覆盖威胁建模、漏洞评估、安全架构设计、代码审计与渗透测试,内置 STRIDE、OWASP、加密模式和安全扫描流程,适合系统设计评审与上线前安全排查。
✎ 安全专家把威胁建模、漏洞分析到渗透测试串成一套流程,内置 STRIDE 与 OWASP 指南,做安全设计和排查更省心。
安全运营
by alirezarezvani
覆盖应用安全、漏洞管理与合规审计,支持代码/依赖扫描、CVE 评估、Secrets 检测和安全自动化,适合做安全基线落地、漏洞响应、审计检查与安全开发治理。
✎ 应用安全、漏洞管理和合规检查一套打通,还能自动化扫描与响应,帮团队更早发现并收敛风险。
安全审计
by alirezarezvani
安装前审计 Claude Code Skill 的代码执行、Prompt 注入和依赖供应链风险,支持本地目录或 Git 仓库扫描,输出 PASS/WARN/FAIL 结论及修复建议
✎ 把代码审查、漏洞扫描和合规检查串成一条线,帮团队更早发现风险,做安全治理更省心。
相关 MCP 服务
by Sentry
搜索和分析 Sentry 错误报告,辅助调试。
✎ 把零散的 Sentry 错误报告变成可检索线索,帮你在海量报错里更快定位线上故障,排障调试明显省时。
by sinewaveai
为 AI agents 提供安全层:拦截 prompt injection、识别伪造 packages,并扫描漏洞风险。
✎ 给 AI Agent 补上关键安全层,能拦截 prompt 注入、识别伪造包并扫描漏洞风险,把防护前置更省心。
by pantheon-security
强化安全性的 NotebookLM MCP,集成 post-quantum encryption,提升数据防护能力。