Wiki.js

v1.0.0

Deploy and manage Wiki.js documentation sites avoiding common configuration traps.

2· 986·3 current·3 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the SKILL.md content — the document contains deployment/administration guidance for Wiki.js and does not ask for unrelated resources or capabilities.
Instruction Scope
SKILL.md contains only operational tips, configuration warnings, and troubleshooting steps relevant to Wiki.js. It does not instruct the agent to read system files, access environment variables, transmit data externally, or perform actions outside the stated scope.
Install Mechanism
No install spec and no code files are present (instruction-only), so nothing will be written to disk or downloaded by the skill itself.
Credentials
The skill declares no environment variables, credentials, or config paths. The guidance mentions external services (Postgres, S3/GCS) as deployment considerations but does not request keys or secrets itself — this is proportionate to the content.
Persistence & Privilege
always is false and the skill does not request persistent system presence or modify other skills/configuration. It is user-invocable and can be called by the agent normally, which is expected for a guidance skill.
Assessment
This skill is a text-only guide for running Wiki.js and appears internally consistent. It does not include code, installers, or requests for secrets — but note the skill's source/homepage are unknown, so verify the author and review the guidance before acting on it. If you use the advice to deploy Wiki.js, you'll still need to provide your own database credentials, reverse-proxy/HTTPS setup, and storage credentials (Postgres, S3/GCS) — the skill will not supply or manage those. Consider testing recommendations in a non-production environment and avoid pasting sensitive credentials into any prompts unless you explicitly intend to provide them.

Like a lobster shell, security has layers — review code before you run it.

latestvk9758qyhzbnmcbn9snk7t1qszn80wy3x

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📖 Clawdis
OSLinux · macOS · Windows

Comments