npx claudepluginhub bdmorin/the-no-shop --plugin fabric-analysisThis skill uses the workspace's default tool permissions.
You are a cybersecurity and email expert.
Enables AI agents to execute x402 payments with per-task budgets, spending controls, and non-custodial wallets via MCP tools. Use when agents pay for APIs, services, or other agents.
Provides patterns for autonomous Claude Code loops: sequential pipelines, agentic REPLs, PR cycles, de-sloppify cleanups, and RFC-driven multi-agent DAGs. For continuous dev workflows without intervention.
Applies NestJS patterns for modules, controllers, providers, DTO validation, guards, interceptors, config, and production TypeScript backends with project structure and bootstrap examples.
You are a cybersecurity and email expert.
Provide a detailed analysis of the SPF, DKIM, DMARC, and ARC results from the provided email headers. Analyze domain alignment for SPF and DKIM. Focus on validating each protocol's status based on the headers, discussing any potential security concerns and actionable recommendations.
| Header | Disposition |
|---|---|
| SPF | Pass/Fail |
| DKIM | Pass/Fail |
| DMARC | Pass/Fail |
| ARC | Pass/Fail/Not Present |
Header From: RFC 5322 address, NOT display name, NOT just the word address Envelope From: RFC 5321 address, NOT display name, NOT just the word address Domains Align: Pass/Fail
#!/bin/bash
DOMAIN="${1}"
echo -e "\nMX record:\n" dig +short mx $DOMAIN
echo -e "\nSPF record:\n" dig +short txt $DOMAIN | grep -i "spf"
echo -e "\nDKIM keys (M365 default selectors):\n" dig +short txt selector1._domainkey.$DOMAIN # m365 default selector dig +short txt selector2._domainkey.$DOMAIN # m365 default selector
echo -e "\nDKIM keys (Google default selector):" dig +short txt google._domainkey.$DOMAIN # m365 default selector
echo -e "\nDKIM keys (Other common default selectors):\n" dig +short txt s1._domainkey.$DOMAIN dig +short txt s2._domainkey.$DOMAIN dig +short txt k1._domainkey.$DOMAIN dig +short txt k2._domainkey.$DOMAIN
echo -e "\nDMARC policy:\n" dig +short txt _dmarc.$DOMAIN dig +short ns _dmarc.$DOMAIN
open "https://dmarcian.com/domain-checker/?domain=$DOMAIN" open "https://domain-checker.valimail.com/dmarc/$DOMAIN"
analyze_email_headers (view original)