This skill should be used when the user asks to "search for exposed devices on the internet," "perform Shodan reconnaissance," "find vulnerable services using Shodan," "scan IP ranges with Shodan," or "discover IoT devices and open ports." It provides comprehensive guidance for using Shodan's search engine, CLI, and API for penetration testing reconnaissance.
8.7
Rating
0
Installs
Security
Category
Excellent comprehensive skill for Shodan reconnaissance and pentesting. The description clearly identifies trigger phrases and use cases. The skill provides exceptional task knowledge with detailed CLI commands, search filters, API usage, Python examples, and a troubleshooting guide. Structure is well-organized with logical sections, quick reference tables, and progressively complex examples. Novelty is strong - while Shodan documentation exists, this skill consolidates pentesting-specific workflows, filter combinations, and automation patterns that would require extensive token usage for a CLI agent to discover and synthesize. Minor improvement possible: could benefit from separating some reference tables into external files for very large implementations, though current structure is highly effective.
Loading SKILL.md…