This directory contains example JSON outputs from the Claw-Hunter tool demonstrating different scenarios.
Example of a clean security audit with no issues detected.
Characteristics:
- All security best practices followed
- Gateway token configured
- No shell access or filesystem write enabled
- No secrets found
- Gateway bound to localhost only
- Exit code:
0
Risk Level: clean
Example of a critical security audit with multiple serious issues.
Characteristics:
- Gateway exposed to all interfaces (0.0.0.0)
- No gateway authentication token
- Shell access enabled
- Filesystem write enabled
- Secrets found in configuration files
- Multiple credential files present
- Exit code:
1
Risk Level: critical
Critical Issues Detected:
- Gateway bound to all interfaces without authentication
- Shell access capability enabled
- Filesystem write capability enabled
- Potential secrets exposed in files
Example of a warning level audit with moderate concerns.
- No critical issues or warnings
- All security best practices followed
- Safe for production use
- Exit code:
0
- Minor security concerns present
- No critical vulnerabilities
- Should be reviewed and addressed
- Exit code:
1
Common warnings:
- Gateway running without auth token (but localhost only)
- Credential files present
- Services not loaded/configured properly
- Serious security vulnerabilities detected
- Immediate action required
- Should not be used in production
- Exit code:
1
Critical issues:
- Gateway exposed to network without authentication
- Shell access enabled
- Filesystem write enabled
- Secrets/API keys in files
Compare your audit output with these examples:
# Run audit
./claw-hunter.sh --json-path my-audit.json
# Compare with examples
diff my-audit.json examples/output-clean.jsonUse these examples to test integrations:
# Parse risk level
jq '.security_summary.risk_level' examples/output-critical.json
# Count critical issues
jq '.security_summary.critical_issues' examples/output-critical.json
# List secrets found
jq '.secrets_files[]' examples/output-critical.jsonTest your SIEM ingestion with these examples:
# Simulate upload
curl -X POST https://your-siem.com/api/audits \
-H "Content-Type: application/json" \
-d @examples/output-critical.jsonAll outputs follow this structure:
{
"mdm_mode": boolean,
"mdm_metadata": {
"hostname": "string",
"serial_number": "string",
"timestamp": "ISO8601",
"script_version": "string"
},
"security_summary": {
"risk_level": "clean|warning|critical",
"critical_issues": number,
"warnings": number,
"info_items": number
},
"platform": "unix|windows",
"os": "macos|linux|windows",
... // Full audit data
}To create your own examples:
-
Run the audit:
./claw-hunter.sh --json-path my-example.json
-
Sanitize sensitive data:
- Remove actual serial numbers
- Remove real hostnames
- Remove API keys/secrets
- Remove personal paths
-
Add clear documentation
-
Submit via pull request
- Main README - Full documentation
- MDM Guides - Deployment instructions
- API Integration - Upload endpoint spec