3x-ui VPN Server Setup
v1.0.0Complete VPN server setup from scratch. Takes a fresh VPS (IP + root + password from hosting provider) through full server hardening and 3x-ui (Xray proxy pa...
⭐ 1· 355·1 current·1 all-time
byMikhail@davydenkovm
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Overall the files and SKILL.md align with the described purpose (setting up and hardening a VPS and installing 3x-ui / Xray VLESS services). The included fallback site and TLS/cert flows are plausible features for a VPN/proxy panel. However, some included content (creating a realistic fake 'cloud login' fallback page) is not strictly required for a VPN panel and may be abused; it sits at the edge of reasonable functionality for this purpose.
Instruction Scope
The runtime instructions instruct the operator (and thus would instruct the agent to prompt the user) to: extract credentials from provider emails, run many privileged system commands, and execute third-party installer scripts fetched over the network (e.g., 'curl https://get.acme.sh | sh'). They also walk the user through creating a realistic-looking fake login page for a fallback site. These steps expand the scope beyond pure VPN configuration into actions with clear privacy and misuse risks (email parsing, remote script execution, creation of phishing-like pages).
Install Mechanism
There is no skill-level install spec (instruction-only), but the guide explicitly recommends running network-fetched installers piped into a shell (acme.sh via curl|sh) and other remote commands. Executing remote scripts without inspection is high-risk. While the referenced tools (acme.sh, x-ui) are commonly used, the instructions encourage patterns that increase the chance of executing malicious or tampered code.
Credentials
The skill does not request any environment variables, credentials stored in the skill, or config paths from the platform. It operates on the user's VPS via SSH and asks the user to provide provider-supplied root/password and domain info at runtime — which is expected for a VPS setup tool. No platform-level secrets are requested.
Persistence & Privilege
The skill is not always-enabled and does not request elevated platform privileges. The guide instructs the operator to install server-side cron jobs (acme.sh renewal) and services on the VPS, which is normal for server setup and within expected scope.
What to consider before installing
This guide appears to do what it says (set up and harden a VPS and install 3x-ui/Xray), but several steps raise caution:
- Remote scripts: The guide tells you to run network-fetched installers (e.g., 'curl https://get.acme.sh | sh'). Running such commands executes unreviewed code on your server — inspect scripts before running, prefer package manager installs, or fetch and audit the script locally first.
- Provider email content: The skill suggests extracting IP/password data from a provider email. Do not paste or share whole emails that may contain unrelated personal or account data; copy only the minimal connection details.
- Fallback page: The included Nginx stub is a realistic fake 'cloud login' page. While cosmetic, such pages can be abused for phishing. Only deploy it if you understand why it's used and you control the domain/legal use.
- Panel security: x-ui and similar panels expose administrative APIs. Follow the guide's advice to change panel credentials, enable 2FA, restrict access (SSH tunneling / localhost binding), and verify the panel source is legitimate before installing.
- If you are uncomfortable auditing installers or managing these security tradeoffs, consider using a vetted distribution or managed service, or run these steps manually with review rather than automating them.
I am moderately confident in this assessment. To raise confidence: provide the omitted parts of SKILL.md (the truncated sections), identify exact remote URLs used for installing x-ui and other binaries, and confirm the provenance of 'AndyShaman' GitHub repo referenced in clawhub.json.Like a lobster shell, security has layers — review code before you run it.
latestvk97axfmczrx25jr6ytbnkkg77d82ey35
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
