Claude Code Plugins

Community-maintained marketplace

Feedback

x-cmd-security

@x-cmd/skill
7
0

This skill provides comprehensive security assessment and vulnerability management tools through x-cmd CLI, including network reconnaissance with Shodan, vulnerability scanning with OSV, and known exploited vulnerability tracking with KEV. This skill should be used when users need to perform security assessments, vulnerability research, network reconnaissance, or security monitoring from command line interfaces.

Install Skill

1Download skill
2Enable skills in Claude

Open claude.ai/settings/capabilities and find the "Skills" section

3Upload to Claude

Click "Upload skill" and select the downloaded ZIP file

Note: Please verify skill by going through its instructions before using it.

SKILL.md

name x-cmd-security
description This skill provides comprehensive security assessment and vulnerability management tools through x-cmd CLI, including network reconnaissance with Shodan, vulnerability scanning with OSV, and known exploited vulnerability tracking with KEV. This skill should be used when users need to perform security assessments, vulnerability research, network reconnaissance, or security monitoring from command line interfaces.

x-cmd Security Assessment Tools

Overview

This skill provides professional security assessment and vulnerability management capabilities through the x-cmd ecosystem. The tools enable security professionals, developers, and system administrators to perform network reconnaissance, vulnerability scanning, and security monitoring directly from the terminal.

Available Tools

Shodan Network Intelligence (shodan)

Comprehensive network reconnaissance and internet intelligence gathering.

  • Usage: x shodan [subcommand]
  • Key subcommands:
    • host - Search and analyze host information
    • scan - Network scanning and port discovery
    • dns - DNS resolution and lookup
    • alert - Network monitoring and alerts
    • cve - CVE vulnerability checking
    • geo - Geolocation-based network testing
  • Examples:
    • x shodan scan create 8.8.8.8 1.1.1.1=53/dns-udp,443/https - Scan specific ports
    • x shodan dns res google.com facebook.com - DNS resolution
    • x shodan cve - Check specific product vulnerabilities
    • x shodan geo geoping 8.8.8.8,4.4.4.4 - Multi-location ping tests

OSV Vulnerability Scanner (osv)

Open Source Vulnerability scanning and dependency analysis.

  • Usage: x osv [subcommand]
  • Key subcommands:
    • query - Query vulnerabilities for specific packages
    • scanner - Use osv-scanner for vulnerability detection
    • sarif - Generate SARIF vulnerability reports
    • vuln - Get detailed vulnerability information
    • eco - List supported ecosystems
  • Examples:
    • x osv q -p jq -v 1.7.1 - Query vulnerabilities for jq 1.7.1
    • x osv sarif - Scan system packages and generate SARIF report
    • x osv vuln OSV-2020-111 - Get detailed vulnerability info
    • x osv : git - Search for git-related vulnerabilities

KEV Vulnerability Catalog (kev)

Known Exploited Vulnerabilities tracking and management.

  • Usage: x kev [subcommand]
  • Key subcommands:
    • ls - List all known exploited vulnerabilities
    • top - List top N vulnerabilities
  • Examples:
    • x kev ls - List all KEV entries
    • x kev top 100 - List top 100 exploited vulnerabilities

Security Use Cases

Network Security Assessment

  • Use x shodan host to discover exposed services
  • Use x shodan scan for targeted port scanning
  • Use x shodan alert for continuous monitoring

Vulnerability Management

  • Use x osv scanner for dependency vulnerability scanning
  • Use x osv query for specific package vulnerability checks
  • Use x kev ls to track actively exploited vulnerabilities

Security Research

  • Use x shodan cve for CVE-based vulnerability research
  • Use x osv vuln for detailed vulnerability analysis
  • Use x shodan trend for historical security trend analysis

Installation and Setup

Prerequisites

  • x-cmd CLI installed
  • Internet connection
  • Shodan API key (for full shodan functionality)

Configuration

Shodan API Setup

x shodan init  # Interactive configuration
x shodan --cfg key=<your-shodan-api-key>

Get Shodan API key from: https://account.shodan.io/

OSV Configuration

OSV typically works without additional configuration for basic queries. For advanced scanning:

x osv scanner --help  # View scanning options

Security Best Practices

Responsible Usage

  • Only scan networks and systems you own or have explicit permission to test
  • Respect rate limits and terms of service for all tools
  • Use vulnerability information for defensive security purposes

Data Protection

  • API keys and sensitive configuration stored locally
  • Review data retention settings with cfg subcommands
  • Be mindful of information disclosure in shared environments

Compliance Considerations

  • Ensure usage complies with local laws and regulations
  • Obtain proper authorization before security testing
  • Document security assessments for audit purposes

Integration with Other Tools

Data Processing

  • Pipe output to x jq for JSON processing
  • Use with @zh for Chinese translation of security findings
  • Export to CSV/JSON for further analysis

Reporting

  • Generate SARIF reports with x osv sarif
  • Use x shodan download for data collection
  • Combine with documentation tools for security reports

Troubleshooting

Common Issues

  • API key errors: Verify Shodan API key configuration
  • Rate limiting: Respect API rate limits and use appropriate intervals
  • Network connectivity: Check internet connection and proxy settings
  • Permission errors: Ensure proper authorization for security testing

Performance Optimization

  • Use --limit flags to control data volume
  • Cache results when appropriate
  • Use specific queries rather than broad searches

Support and Resources

For additional help:

  • Use x [tool] --help for specific tool documentation
  • Visit individual module pages for detailed usage
  • Check tool-specific configuration options