安全审计
Lynis
by bytesagain1
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance tes system-hardener, shell, auditing, compliance, devops.
安装
claude skill add --url github.com/openclaw/skills/tree/main/skills/bytesagain1/system-hardener文档
System Hardener
System Hardener v2.0.0 — a sysops toolkit for tracking and documenting system hardening activities from the command line. Record security scans, monitor compliance, log fixes, and maintain a complete audit trail of every hardening step you take.
Why System Hardener?
- Works entirely offline — your data never leaves your machine
- Simple command-line interface, no GUI needed
- Timestamped logging for every operation
- Export to JSON, CSV, or plain text for compliance evidence
- Automatic history and activity tracking
- Searchable records across all security categories
Getting Started
# See all available commands
system-hardener help
# Check current health status
system-hardener status
# View summary statistics
system-hardener stats
Commands
Operations Commands
Each command works in two modes: run without arguments to view recent entries, or pass input to record a new entry.
| Command | Description |
|---|---|
system-hardener scan <input> | Record security scan results (vulnerability scans, CIS benchmarks, port audits) |
system-hardener monitor <input> | Log monitoring observations (intrusion attempts, failed logins, file integrity) |
system-hardener report <input> | Create report entries (compliance reports, audit summaries, risk assessments) |
system-hardener alert <input> | Record alert events (security warnings, policy violations, anomaly detections) |
system-hardener top <input> | Log top-level security metrics (most targeted services, top attack sources) |
system-hardener usage <input> | Track usage data (firewall rule hits, SELinux denials, auth attempts) |
system-hardener check <input> | Record health checks (config compliance, patch status, certificate validity) |
system-hardener fix <input> | Document fixes applied (security patches, config hardening, permission fixes) |
system-hardener cleanup <input> | Log cleanup operations (stale accounts, unused services, expired certs) |
system-hardener backup <input> | Track backup operations (security config backups, key backups) |
system-hardener restore <input> | Record restore operations (config rollbacks, key recovery) |
system-hardener log <input> | General-purpose log entries (security notes, observations, research) |
system-hardener benchmark <input> | Record benchmark results (CIS scores, hardening scores, before/after) |
system-hardener compare <input> | Log comparison data (baseline diffs, cross-host audits, pre/post hardening) |
Utility Commands
| Command | Description |
|---|---|
system-hardener stats | Show summary statistics across all log categories |
system-hardener export <fmt> | Export all data (formats: json, csv, txt) |
system-hardener search <term> | Search across all entries for a keyword |
system-hardener recent | Show the 20 most recent history entries |
system-hardener status | Health check — version, data dir, entry count, disk usage |
system-hardener help | Show the built-in help message |
system-hardener version | Print version (v2.0.0) |
Data Storage
All data is stored locally in ~/.local/share/system-hardener/. Structure:
scan.log,monitor.log,report.log, etc. — one log file per command, pipe-delimited (timestamp|value)history.log— unified activity log across all commandsexport.json/export.csv/export.txt— generated export files
Each entry is stored as YYYY-MM-DD HH:MM|<input>. Use export to back up your data anytime.
Requirements
- Bash 4+ (uses
set -euo pipefail) - Standard Unix utilities (
date,wc,du,tail,grep,sed,cat) - No external dependencies or internet access needed
When to Use
- Compliance auditing — Track every hardening action with timestamps to produce evidence for HIPAA, ISO 27001, or PCI DSS audits
- Security incident response — During an incident, log scans, alerts, and fixes in one place to build a complete forensic timeline
- Baseline comparison — Use
benchmarkandcompareto record CIS scores before and after hardening to prove measurable improvement - Change management documentation — Log every security fix, config change, and cleanup so you have an auditable change history
- Multi-host hardening campaigns — Track progress across a fleet by recording scan and check results per host, then
searchby hostname
Examples
# Record a vulnerability scan result
system-hardener scan "CIS Level 2 scan on db-prod-01: 94% compliant, 7 findings"
# Log a security alert
system-hardener alert "3 failed SSH root login attempts from 203.0.113.42 in 5 min"
# Document a hardening fix
system-hardener fix "Disabled SSHv1, set PermitRootLogin=no on all prod hosts"
# Record a benchmark score
system-hardener benchmark "Lynis score: 78 → 91 after hardening pass on web-tier"
# Export audit trail to JSON for compliance
system-hardener export json
# Search logs for a specific host
system-hardener search "db-prod-01"
# View recent activity
system-hardener recent
Output
All commands output to stdout. Redirect to a file if needed:
system-hardener stats > audit-summary.txt
system-hardener export csv
Configuration
Set SYSTEM_HARDENER_DIR environment variable to override the default data directory (~/.local/share/system-hardener/).
Powered by BytesAgain | bytesagain.com | hello@bytesagain.com
相关 Skills
表格处理
by anthropics
围绕 .xlsx、.xlsm、.csv、.tsv 做读写、修复、清洗、格式整理、公式计算与格式转换,适合修改现有表格、生成新报表或把杂乱数据整理成交付级电子表格。
✎ 做 Excel/CSV 相关任务很省心,能直接读写、修复、清洗和格式转换,尤其擅长把乱七八糟的表格整理成交付级文件。
PDF处理
by anthropics
遇到 PDF 读写、文本表格提取、合并拆分、旋转加水印、表单填写或加解密时直接用它,也能提取图片、生成新 PDF,并把扫描件通过 OCR 变成可搜索文档。
✎ PDF杂活别再来回切工具了,文本表格提取、合并拆分到OCR识别一次搞定,连扫描件也能变可搜索。
Word文档
by anthropics
覆盖Word/.docx文档的创建、读取、编辑与重排,适合生成报告、备忘录、信函和模板,也能处理目录、页眉页脚、页码、图片替换、查找替换、修订批注及内容提取整理。
✎ 搞定 .docx 的创建、改写与精排版,目录、批量替换、批注修订和图片更新都能自动化,做正式文档尤其省心。
相关 MCP 服务
文件系统
编辑精选by Anthropic
Filesystem 是 MCP 官方参考服务器,让 LLM 安全读写本地文件系统。
✎ 这个服务器解决了让 Claude 直接操作本地文件的痛点,比如自动整理文档或生成代码文件。适合需要自动化文件处理的开发者,但注意它只是参考实现,生产环境需自行加固安全。
by wonderwhy-er
Desktop Commander 是让 AI 直接执行终端命令、管理文件和进程的 MCP 服务器。
✎ 这工具解决了 AI 无法直接操作本地环境的痛点,适合需要自动化脚本调试或文件批量处理的开发者。它能让你用自然语言指挥终端,但权限控制需谨慎,毕竟让 AI 执行 rm -rf 可不是闹着玩的。
EdgarTools
编辑精选by dgunning
EdgarTools 是无需 API 密钥即可解析 SEC EDGAR 财报的开源 Python 库。
✎ 这个工具解决了金融数据获取的痛点——直接让 AI 读取结构化财报,比如让 Claude 分析苹果的 10-K 文件。适合量化分析师或金融开发者快速构建数据管道。但注意,它依赖 SEC 网站稳定性,高峰期可能延迟。