Web Check

by bytesagain1

Analyze websites with OSINT reconnaissance and security scanning. Use when inspecting headers, checking DNS, analyzing SSL certs, generating reports.

3.7k安全与合规未扫描2026年3月23日

安装

claude skill add --url github.com/openclaw/skills/tree/main/skills/bytesagain1/site-inspector

文档

Site Inspector

Website analysis and OSINT reconnaissance toolkit. Inspect sites, log security checks, analyze results, and generate reports — all from the command line.

Commands

Run site-inspector <command> [args] to use.

CommandDescription
run <input>Run a site inspection and log the result
check <input>Check a specific URL or endpoint
convert <input>Convert inspection data between formats
analyze <input>Analyze site security or performance patterns
generate <input>Generate inspection templates or configs
preview <input>Preview an inspection configuration before running
batch <input>Batch process multiple sites at once
compare <input>Compare inspection results between sites or runs
export <input>Export logged data (also supports export <fmt> for json/csv/txt)
config <input>Save or view configuration entries
status <input>Log status entries (also runs health check with no args via utility)
report <input>Generate or log inspection reports
statsShow summary statistics across all log files
search <term>Search all entries for a keyword
recentShow the 20 most recent history entries
helpShow help message
versionShow version (v2.0.0)

Each data command (run, check, convert, analyze, generate, preview, batch, compare, export, config, status, report) works in two modes:

  • Without arguments — displays the 20 most recent entries from its log
  • With arguments — saves the input with a timestamp to its dedicated log file

Data Storage

All data is stored in ~/.local/share/site-inspector/:

  • run.log, check.log, convert.log, analyze.log, generate.log, preview.log — per-command log files
  • batch.log, compare.log, export.log, config.log, status.log, report.log — additional command logs
  • history.log — unified activity history across all commands
  • export.json, export.csv, export.txt — generated export files

Set SITE_INSPECTOR_DIR environment variable to override the default data directory.

Requirements

  • Bash 4+ with standard coreutils (date, wc, du, tail, grep, sed)
  • No external dependencies — pure shell implementation

When to Use

  1. Website security audits — log and track OSINT reconnaissance findings for target sites
  2. DNS and header inspection — record DNS records, HTTP headers, and SSL certificate details
  3. Batch site analysis — process multiple domains or endpoints in one run
  4. Comparing site configurations — compare inspection results across different sites or time periods
  5. Generating security reports — produce structured reports from accumulated inspection data

Examples

bash
# Run an inspection on a domain
site-inspector run "example.com headers=OK ssl=valid dns=resolved"

# Check a specific endpoint
site-inspector check "https://api.example.com/health status=200 latency=42ms"

# Analyze logged patterns
site-inspector analyze "ssl_expiry_trend: 3 certs expiring within 30 days"

# Batch inspect multiple sites
site-inspector batch "domains=25 scanned=25 issues_found=3"

# Compare two inspection runs
site-inspector compare "example.com run1 vs run2: headers changed, ssl renewed"

# Generate a report entry
site-inspector report "Weekly security audit - 15 domains - all clear"

# Export all data as JSON
site-inspector export json

# Search for entries about a specific domain
site-inspector search "api.example.com"

# View recent activity
site-inspector recent

# Show statistics
site-inspector stats

Output

All commands output results to stdout. Log entries are stored with timestamps in pipe-delimited format (YYYY-MM-DD HH:MM|value). Use export to convert all data to JSON, CSV, or plain text.


Powered by BytesAgain | bytesagain.com | hello@bytesagain.com

相关 Skills

安全专家

by alirezarezvani

Universal
热门

覆盖威胁建模、漏洞评估、安全架构设计、代码审计与渗透测试,内置 STRIDE、OWASP、加密模式和安全扫描流程,适合系统设计评审与上线前安全排查。

安全专家把威胁建模、漏洞分析到渗透测试串成一套流程,内置 STRIDE 与 OWASP 指南,做安全设计和排查更省心。

安全与合规
未扫描9.0k

安全运营

by alirezarezvani

Universal
热门

覆盖应用安全、漏洞管理与合规审计,支持代码/依赖扫描、CVE 评估、Secrets 检测和安全自动化,适合做安全基线落地、漏洞响应、审计检查与安全开发治理。

应用安全、漏洞管理和合规检查一套打通,还能自动化扫描与响应,帮团队更早发现并收敛风险。

安全与合规
未扫描9.0k

安全审计

by alirezarezvani

Universal
热门

安装前审计 Claude Code Skill 的代码执行、Prompt 注入和依赖供应链风险,支持本地目录或 Git 仓库扫描,输出 PASS/WARN/FAIL 结论及修复建议

把代码审查、漏洞扫描和合规检查串成一条线,帮团队更早发现风险,做安全治理更省心。

安全与合规
未扫描9.0k

相关 MCP 服务

搜索和分析 Sentry 错误报告,辅助调试。

把零散的 Sentry 错误报告变成可检索线索,帮你在海量报错里更快定位线上故障,排障调试明显省时。

安全与合规
616

为 AI agents 提供安全层:拦截 prompt injection、识别伪造 packages,并扫描漏洞风险。

给 AI Agent 补上关键安全层,能拦截 prompt 注入、识别伪造包并扫描漏洞风险,把防护前置更省心。

安全与合规
92

强化安全性的 NotebookLM MCP,集成 post-quantum encryption,提升数据防护能力。

安全与合规
47

评论