首页龙虾技能列表 › fofamap

🗺️ fofamap

v1.0.1

Use this skill when the user wants FOFA-based asset discovery, host profiling, distribution statistics, icon_hash generation, query refinement after zero-res...

1· 61·0 当前·0 累计
by @asaotomo·MIT-0
下载技能包
License
MIT-0
最后更新
2026/4/13
安全扫描
VirusTotal
无害
查看报告
OpenClaw
安全
high confidence
The skill's requirements and instructions align with its stated FOFA recon purpose; it only needs FOFA credentials and python3 and operates through the included helper script, though it persists local memory and can perform live checks if asked.
评估建议
This skill appears coherent for FOFA-based reconnaissance. Before installing: 1) Only provide FOFA_EMAIL and FOFA_API_KEY (do not reuse broader or high-privilege keys). Consider creating a FOFA account with minimal privileges for this purpose. 2) Be aware the helper stores local memory and exports (default results/fofamap_memory and results/ directories); if the findings are sensitive, set FOFAMAP_DISABLE_LEARNING or change FOFAMAP_MEMORY_DIR to a secure location. 3) The tool can perform live 'a...
详细分析 ▾
用途与能力
Name/description describe FOFA-based asset discovery and the skill requires FOFA credentials (FOFA_EMAIL, FOFA_API_KEY) and python3, which are exactly what's needed to call the FOFA API and run the included helper. The included reference playbooks and corpus support query-building and are coherent with the recon purpose.
指令范围
SKILL.md instructs the agent to run scripts/fofa_recon.py for search/host/stats/icon-hash/monitor-run and to call login for permission profiling. That is in-scope for FOFA workflows, but the runtime instructions also: (a) perform optional live 'alive-check' network probes against target hosts; (b) recommend (but do not forcibly run) downstream active scanning (nuclei) when explicitly requested; and (c) maintain a bounded local memory (results/fofamap_memory) by default. These behaviors are sensible for a recon tool but are notable because they entail active network interactions and local persistence of discovered assets and queries.
安装机制
No install spec is provided (instruction-only + included script), so nothing is downloaded or installed automatically by the registry. The runtime requirement is python3 and the included script files — low install risk.
凭证需求
Only FOFA-related credentials are required: FOFA_EMAIL and FOFA_API_KEY (primaryEnv FOFA_API_KEY). Optional env vars in docs (FOFA_BASE_URL, FOFA_TIMEOUT, FOFAMAP_MEMORY_DIR, FOFAMAP_DISABLE_LEARNING) are reasonable for configuration. No unrelated secrets or external service tokens are requested.
持久化与权限
The skill is not force-enabled (always:false) but the included helper keeps local memory by default (results/fofamap_memory) and supports monitor-run for recurring jobs. agents/openai.yaml sets allow_implicit_invocation: true, and model invocation is allowed (disable-model-invocation:false) — normal for skills, but combined with local persistence and scheduled monitor-run modes means the skill can be used in ongoing automation and will write query/results to disk unless configured otherwise.
安全有层次,运行前请审查代码。

License

MIT-0

可自由使用、修改和再分发,无需署名。

运行时依赖

无特殊依赖

版本

latestv1.0.12026/4/9

**New version adds comprehensive playbooks, FOFA permission awareness, recurring monitoring, and local learning capability.** - Added multiple playbooks, syntax guides, report templates, and a reusable query syntax corpus for more robust and flexible FOFA workflows. - Enhanced skill to detect FOFA membership tier and capability profile, improving automatic field selection and error handling. - Introduced recurring asset monitoring and inventory drift detection using monitor mode and snapshot comparison. - Added local bounded memory to support self-improvement across runs, including learning from failures, friction, and reporting patterns. - Expanded quick start examples to cover advanced and recurring use cases. - Updated workflow and reference sections to reflect new monitoring, red team, and reporting guidance.

● 无害

安装命令 点击复制

官方npx clawhub@latest install fofamap
镜像加速npx clawhub@latest install fofamap --registry https://cn.clawhub-mirror.com

技能文档

Overview

This skill turns natural-language recon requests into a stable FOFA workflow:

  • pick the right FOFA operation,
  • detect the FOFA membership tier and capability profile,
  • run deterministic API calls through scripts/fofa_recon.py,
  • broaden the search when FOFA returns no useful data,
  • verify live web reachability when it matters,
  • track inventory drift with snapshot comparisons when the task is recurring,
  • export clean handoff files when the user needs deliverables,
  • summarize findings with clear caveats and next steps,
  • learn from prior runs so the next query, report, and handoff improve.

This skill is distilled from the FofaMap project, but packaged for skill use instead of an interactive application. The host agent should do the reasoning, and the helper script should do the FOFA API work. The workflow keeps the project's key tactics: action routing, permission-aware field selection, zero-result reflection, live reachability verification, export-oriented delivery, and targeted follow-up suggestions. It now also keeps a bounded local memory so the skill can reflect on failed runs, recurring friction, and strong report patterns without turning into an uncontrolled self-modifying black box.

For setup, the user only needs to provide FOFA credentials:

  • FOFA_EMAIL
  • FOFA_API_KEY

When To Use

Use this skill when the user asks for any of the following:

  • find exposed assets, subdomains, services, or product fingerprints with FOFA
  • profile a single IP or domain with FOFA host aggregation
  • analyze distribution data such as country, port, title, ASN, or organization rankings
  • run recurring asset monitoring and compare new, removed, or changed exposures
  • derive an icon_hash query from a target website
  • retry a failed FOFA search with broader, smarter fallback queries
  • decide whether the findings justify a separate validation step such as nuclei

Do not use this skill for:

  • general web scraping unrelated to FOFA
  • active exploitation by default
  • network scanning without explicit user approval
  • tasks that require guaranteed real-time validation beyond FOFA's indexed data

Quick Start

If credentials are not configured yet, read references/setup.md.

Required credentials for this skill:

  • FOFA email
  • FOFA API key

Core helper:

  • scripts/fofa_recon.py login
  • scripts/fofa_recon.py search --query 'app="nginx" && country="US"'
  • scripts/fofa_recon.py search --query 'app="nginx" && country="US"' --alive-check --output nginx_us.xlsx
  • scripts/fofa_recon.py search-next --query 'title="login"' --fields host,ip,port,title --max-pages 3
  • scripts/fofa_recon.py search-next --query 'app="nginx"' --size 100 --max-pages 2 --output nginx_deep.xlsx
  • scripts/fofa_recon.py search --query 'cert.subject.org="Google"' --fields ip,port,product,product.version,cert.is_valid
  • scripts/fofa_recon.py host --target 8.8.8.8
  • scripts/fofa_recon.py host --target 8.8.8.8 --report-output host_report.md
  • scripts/fofa_recon.py stats --query 'app="Redis"' --fields country,port,org
  • scripts/fofa_recon.py stats --query 'app="Redis"' --fields country,port,org --report-output stats_report.md
  • scripts/fofa_recon.py alive-check --target example.com --target 1.1.1.1:8443 --output alive.csv
  • scripts/fofa_recon.py monitor-run --query 'org="Example Corp"' --state-dir results/monitor_example --report-output results/monitor_example/latest_report.md
  • scripts/fofa_recon.py monitor-run --query-file queries.txt --use-search-next --max-pages 3 --state-dir results/monitor_monthly --fail-on-change
  • scripts/fofa_recon.py project-run --query 'app="nginx" && country="US"' --query 'app="grafana" && country="US"' --alive-check --split-exports
  • scripts/fofa_recon.py learn-review
  • scripts/fofa_recon.py icon-hash --url https://example.com

Workflow

1. Choose the correct mode

  • Use search when the user wants concrete assets.
  • Use search-next when the user wants deeper harvesting through FOFA's official continuous paging cursor API.
  • Use host when the user gives one IP or one domain and wants details.
  • Use stats when the user wants rankings, trends, or distribution.
  • Use icon-hash when the user wants similar assets by favicon.
  • Use monitor-run when the same queries will be rerun on a schedule and the user cares about newly added, removed, or changed assets.

host returns a normalized host_profile when FOFA exposes richer host data such as domains, protocols, ISP, rules, or per-port rule hints.

stats returns a normalized stats_summary with consumed_fpoint, required_fpoints, and lastupdatetime when FOFA includes them.

2. Read the FOFA capability profile first when permissions matter

Run scripts/fofa_recon.py login before planning when the user needs:

  • host or stats and you are not sure the account supports those APIs
  • advanced export fields such as product, body, product.version, cert.is_valid, or icon
  • a field-heavy handoff where you need to know what FOFA will actually return

The helper returns a permission_profile object with:

  • vip_level and human-readable tier name
  • can_use_host_api and can_use_stats_api
  • allowed_search_fields
  • documented_search_export_field_count
  • data_limit
  • default_search_fields_csv
  • search_field_presets

Use that profile to choose fields before issuing the search.

3. Start conservative

Default to safe, broadly available fields unless the user explicitly needs premium FOFA fields. The helper script already falls back to a safe field set if a higher-tier field request is rejected.

Before using advanced fields or highly specific filters, check references/query-playbook.md, references/permission-playbook.md, and references/syntax-arsenal.md.

When the user intent is fuzzy, exploratory, or hunt-style, search references/syntax-corpus.tsv by product, tag, rule name, or artifact string and use it to generate one precise query plus one or two controlled fallback queries. Treat the corpus as a seed library, not a hard limit on what FOFA combinations are allowed.

If the task is attack-infrastructure hunting, takeover review, honeypot suspicion, or cloud/API leak discovery, also load references/redteam-hunt-playbook.md.

If the user wants a polished report, persuasive delivery, or a specific analyst angle, also load references/report-templates.md and choose a suitable --report-profile such as attack-infrastructure, abnormal-exposure, or takeover-risk.

If the task is recurring, long-running, or the user explicitly wants the skill to improve from experience, also load references/evolution-playbook.md. The helper writes local episodic and semantic memory under results/fofamap_memory/ by default and exposes learning_artifacts plus learn-review.

When the user wants more than one ordinary page of results, prefer search-next over repeatedly emulating page numbers. It follows FOFA's official /api/v1/search/next cursor flow and returns next_cursor_to_resume, has_more, requested_size, effective_size, and cursor_trace so later runs can resume cleanly and explain any FOFA size cap that was applied.

4. If the result set is empty, reflect and retry

Do up to three progressively broader retries:

  • remove the most brittle geographic or version-specific filter
  • replace host= with broader title=, body=, or product-style matching when appropriate
  • keep only the most distinctive keyword plus a coarse scope such as country or protocol

State clearly that the later attempts are broader fallback queries, not equivalent matches.

5. Summarize like an analyst

When reporting results, include:

  • the user goal in one line
  • the FOFA query or queries used
  • the scope and major findings
  • any important field or subscription limitations
  • a cautious next-step recommendation

When the report needs to feel complete and operator-ready, choose a report profile instead of writing in a generic voice. Use:

  • standard for baseline delivery
  • attack-infrastructure for clustering, campaign-style, or suspicious infra review
  • abnormal-exposure for admin panels, storage leakage, API exposure, and unusual services
  • takeover-risk for dangling domains, placeholder pages, and ownership gaps

6. Add live verification when it changes the answer

Use --alive-check or alive-check when the user wants:

  • a current reachable subset of FOFA results
  • dead assets filtered out before handoff
  • a cleaner candidate list for later validation work

If the user asks for a deliverable, prefer exporting the checked result set so the handoff includes the current HTTP status.

7. Export for handoff, not just for storage

Use:

  • xlsx when handing off to analysts, red teams, or non-technical stakeholders
  • csv when another tool or script will consume the result

If live checks were run, include the HTTP status in the export. This preserves one of the most practical parts of the original project: not just finding assets, but packaging them for the next operator.

8. Gate active follow-up

If the user wants active validation, ask or confirm before running tools such as nuclei, curl-based checks, or login probes. FOFA is passive indexed intelligence; active testing is a separate consent boundary.

9. Prefer project mode for real jobs

When the user has multiple queries, wants delivery files, or needs a mini operation bundle, prefer project-run. It preserves one of the original project's best ideas: a single task should leave behind a project directory with exports, targets.txt, a suggested Nuclei command, and a Markdown report.

If the user explicitly wants active scanning and has authorization, project-run --run-nuclei can extend that workflow into a local Nuclei scan and fold the log summary into the report.

10. Use monitor mode for recurring asset watch

Use monitor-run when the user asks for daily, weekly, or monthly asset tracking.

  • The first run establishes a baseline snapshot.
  • Later runs compare against latest_snapshot.json and report added, removed, and changed assets.
  • Prefer a stable --state-dir so scheduled runs always compare against the same monitoring profile.
  • Add --use-search-next for larger inventories and --fail-on-change when an automation should raise an alert on drift.
  • The command leaves behind latest_snapshot.json, latest_diff.json, latest_report.md, timestamped archives, and optional per-query exports.

Working Rules

  • Prefer the helper script over ad hoc HTTP code so the workflow stays consistent.
  • Keep output compact and analyst-friendly. Raw JSON is fine when another tool will consume it; otherwise summarize it.
  • Call out when FOFA data may be stale, partial, or permission-limited.
  • If the user asks for premium-only fields, inspect permission_profile first. The helper script will also drop known over-tier fields before the request and report that downgrade explicitly.
  • For high-risk follow-up suggestions, separate "observed from FOFA" from "needs live validation."
  • When the task is analytical rather than mechanical, use the reporting patterns in references/analysis-playbook.md.
  • When the task needs an operator handoff, create files, not just chat output.
  • When local memory exists, read the latest reflection before repeating a similar task so the agent actually benefits from prior runs.

References

数据来源:ClawHub ↗ · 中文优化:龙虾技能库
OpenClaw 技能定制 / 插件定制 / 私有工作流定制

免费技能或插件可能存在安全风险,如需更匹配、更安全的方案,建议联系付费定制

了解定制服务