How to Discover Hidden Services with OpenClaw
Hidden service discovery with OpenClaw and ToolRouter. Find exposed infrastructure.
ToolSecurity HTTPxOpenClaw runs HTTP service probes as systematic, large-scale scanning operations that cover your entire web infrastructure in one pass. Feed it a list of domains, subdomains, and IP ranges to get back a comprehensive inventory of responding services with their security header status, SSL configuration, and detected technologies. Its batch scanning approach is essential for organizations managing large infrastructures that need continuous visibility into their HTTP attack surface.
Connect ToolRouter to OpenClaw
1Install the CLI
npm install -g toolrouter-mcp2Call tools directly from OpenClaw
toolrouter-mcp call web-search search --query "AI tools"
toolrouter-mcp toolsSteps
Once connected (see setup above), use the Security HTTPx tool:
- Ask OpenClaw: "Scan for hidden HTTP services on my domain"
- OpenClaw probes and reports all responding services
- Identify unauthorized or forgotten services
- Restrict or decommission exposed services
Example Prompt
Try this with OpenClaw using the Security HTTPx tool
Discover all HTTP services running on subdomains of mycompany.com, including non-standard ports.
Tips
- Hidden services are among the top initial access vectors for attackers
- Maintain an inventory of all authorized services and compare against scan results
- Services exposed during development often remain exposed in production if not actively managed