From runzero
Lists RunZero-discovered wireless networks, identifies rogue access points, analyzes encryption security, and audits SSIDs for authorized networks.
npx claudepluginhub wyre-technology/msp-claude-plugins --plugin runzeroThis skill uses the workspace's default tool permissions.
RunZero discovers wireless networks visible from explorer locations, including authorized corporate networks, guest networks, and potential rogue access points. Wireless discovery helps MSPs maintain visibility into the RF environment and identify unauthorized network infrastructure.
Guides Next.js Cache Components and Partial Prerendering (PPR) with cacheComponents enabled. Implements 'use cache', cacheLife(), cacheTag(), revalidateTag(), static/dynamic optimization, and cache debugging.
Migrates code, prompts, and API calls from Claude Sonnet 4.0/4.5 or Opus 4.1 to Opus 4.5, updating model strings on Anthropic, AWS, GCP, Azure platforms.
Reviews prose for communication issues impeding comprehension, outputs minimal fixes in a three-column table per Microsoft Writing Style Guide. Useful for 'review prose' or 'improve prose' requests.
RunZero discovers wireless networks visible from explorer locations, including authorized corporate networks, guest networks, and potential rogue access points. Wireless discovery helps MSPs maintain visibility into the RF environment and identify unauthorized network infrastructure.
Each discovered wireless network includes:
| Attribute | Description |
|---|---|
essid | The network name (SSID) |
bssid | The access point MAC address |
channel | The wireless channel |
encryption | Security protocol (WPA2, WPA3, WEP, Open) |
signal | Signal strength |
type | Infrastructure or ad-hoc |
vendor | AP hardware vendor (from OUI lookup) |
first_seen | When the network was first discovered |
last_seen | When the network was last observed |
site_id | The site where the network was detected |
| Encryption | Security Level | Notes |
|---|---|---|
| WPA3 | Strong | Recommended standard |
| WPA2-Enterprise | Strong | Requires RADIUS |
| WPA2-Personal | Moderate | Vulnerable to offline brute force |
| WPA | Weak | Deprecated; upgrade recommended |
| WEP | Critical | Trivially breakable; must replace |
| Open | None | No encryption; use only for guest with captive portal |
A rogue access point is an unauthorized AP connected to the corporate network. Indicators include:
runzero_wireless_list
Parameters:
site_id -- Filter by sitesearch -- RunZero query stringcount -- Results per pageoffset -- Pagination offsetExample response:
{
"wireless": [
{
"id": "wireless-uuid-123",
"essid": "ACME-Corporate",
"bssid": "AA:BB:CC:DD:EE:FF",
"channel": 6,
"encryption": "WPA2-Enterprise",
"signal": -45,
"vendor": "Cisco Meraki",
"type": "infrastructure",
"first_seen": "2026-01-15T10:00:00Z",
"last_seen": "2026-03-27T08:30:00Z",
"site_id": "site-uuid-456"
}
]
}
runzero_wireless_get
Parameters:
wireless_id -- The specific wireless network UUIDrunzero_wireless_listCause: Explorer does not have a wireless adapter, or wireless scanning is disabled Solution: Verify explorer has wireless capability; enable wireless scanning in scan configuration
Cause: Explorer can only detect APs within radio range Solution: Deploy explorers at multiple physical locations for comprehensive coverage