EdgeWalker is a high-performance IoT security scanner that audits your home network for open ports, default credentials, and known vulnerabilities. Developed by periphery), it empowers users to verify the security claims of their smart devices rather than relying on marketing labels.
Contributing Guidelines
·
Submit an Issue
| EdgeWalker Demo | Scan Report |
![]() |
![]() |
| Feature | Description | How it Works |
|---|---|---|
| Port Scan | Identifies open ports and active services. | nmap wrapper with parallel batch scanning. |
| Credential Test | Checks for default/weak passwords (SSH, FTP, Telnet, SMB). | Bundled database of ~430 common IoT credentials. |
| CVE Check | Matches detected software against known vulnerabilities. | Real-time NVD API lookup. |
| Risk Scoring | Provides an actionable security grade (A-F). | Proprietary scoring engine (0-100). |
curl -sSL https://raw.githubusercontent.com/periphery-security/edgewalker/main/scripts/install.sh | sudo bashpipx install git++https://github.com/periphery-security/edgewalker.gitThe installer verifies Python 3.13+, installs nmap if missing, and configures edgeWalker as a global CLI command.
NOTE: We are currently awaiting approval of the package on pypi.org to allow edgeWalker to be installed via pipx as a package.
edgewalkerNote: On macOS, use
sudo edgewalker. On Linux, the installer configuresnmapcapabilities, removing the need forsudo.
edgewalker scan # Quick port scan (~30s)
edgewalker scan --full # Full 65,535 port scan
edgewalker scan --target 10.0.0.1 # Scan a single device
edgewalker creds # Test default credentials
edgewalker cve # Check for known CVEs
edgewalker report # View security reportEdgeWalker supports non-interactive execution for automated environments:
# Run a silent scan with explicit telemetry opt-in
edgewalker --silent --accept-telemetry scan --target 192.168.1.0/24See the Configuration Guide for more details.
We frequently encounter vendors who promise "secure by design" devices. We don't buy it. EdgeWalker began at Periphery's 2025 Hackathon, built in 48 hours by Dr Lina Anaya, Travis Pell, Steven Marks, and Adam Massey. It represents our commitment to transparency and evidence-based security in the IoT era.
Read through our contributing guidelines to learn about our submission process, coding rules, and more.
Want to report a bug, contribute some code, or improve the documentation? Excellent! Read our guidelines for contributing and then check out one of our issues labeled as help wanted or good first issue.
Help us keep Edgewalker open and inclusive. Please read and follow our Code of Conduct.
EdgeWalker is for authorized security testing only. Use this tool only on networks and devices you own or have explicit permission to scan. Unauthorized scanning of third-party networks may be illegal. Periphery and the EdgeWalker contributors assume no liability for misuse of this tool.
If EdgeWalker helps you secure your home, please give us a Star on GitHub! It helps others find the project and keeps us motivated to build more.
Distributed under the MIT License. See LICENSE for more information.

