ToxTunnel Ops

AdvisoryAudited by Static analysis on May 8, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A misconfigured tunnel could give remote access to SSH, databases, desktops, or internal web apps.

Why it was flagged

The skill is explicitly designed to create remote tunnels into internal services, which is powerful and dual-use, but this is disclosed as the main purpose.

Skill content
Use when: remote SSH without port forwarding, NAT traversal, intranet penetration, exposing internal services, generating ToxTunnel config files...
Recommendation

Use this only for systems you own or administer, require friend-specific rules, avoid wildcard hosts or all-port rules, enable logging, and revoke access promptly.

What this means

Installing a downloaded network daemon with sudo means you are trusting that release artifact and its publisher.

Why it was flagged

The install guidance uses mutable latest GitHub release assets and privileged package installation.

Skill content
wget "https://github.com/anonymoussoft/tox-tcp-tunnel/releases/latest/download/toxtunnel-Linux-${ARCH}-latest.deb"
sudo dpkg -i "toxtunnel-Linux-${ARCH}-latest.deb"
Recommendation

Prefer pinned versions, verify checksums or signatures when available, review the project source/release provenance, and install from a trusted package source when possible.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

A persistent tunnel can keep remote access available after the setup session ends.

Why it was flagged

The docs show how to make the tunnel run persistently as a service, while also stating that persistence should be explicit.

Skill content
Only do this when the user explicitly asks for persistent service management... sudo systemctl enable toxtunnel... <key>KeepAlive</key><true/>... sc create ToxTunnel ... start= auto
Recommendation

Only enable persistence when needed, document the service, monitor logs, and know the exact stop/disable commands before enabling it.

What this means

If the identity file is copied or mishandled, access rules based on that identity may no longer represent the intended person or device.

Why it was flagged

ToxTunnel creates and relies on a persistent local identity file; protecting it is part of protecting tunnel access.

Skill content
Back up `tox_save.dat` on both sides — it's the identity
Recommendation

Store data directories with restrictive permissions, treat tox_save.dat like a credential, and rotate identities or remove friend rules if it may be exposed.