Tailscale

ReviewAudited by ClawScan on May 10, 2026.

Overview

This appears to be a legitimate Tailscale management skill, but it can perform powerful tailnet changes and should be used only with explicit approval for sensitive actions.

This skill is suitable if you want Clawdbot to help manage Tailscale, but treat it like an admin tool. Review commands before they run, especially anything that deletes devices, creates reusable auth keys, changes DNS, enables SSH, sends files, or exposes a local service with Tailscale Funnel.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If used carelessly, the agent could remove devices, authorize devices, create reusable access keys, or otherwise change the user's Tailscale network state.

Why it was flagged

The skill clearly documents tailnet-wide administrative actions, including authorization, deletion, and auth-key creation. These are aligned with the Tailscale management purpose, but they are high-impact operations that should not be run without user confirmation.

Skill content
These manage your entire tailnet. Requires API key. ... ./scripts/ts-api.sh authorize <device-id> ... ./scripts/ts-api.sh delete <device-id> ... ./scripts/ts-api.sh create-key --reusable --tags tag:server
Recommendation

Confirm the exact device, key, DNS, SSH, or public-exposure action with the user before running mutating commands, especially delete, authorize, create-key, magic-dns, serve/funnel, or SSH-related commands.

What this means

Anyone or any agent process with access to the API key could perform Tailscale API operations permitted by that key.

Why it was flagged

The helper script loads a Tailscale API key from a local credentials file or environment variable and uses it for authenticated API calls. This is expected for tailnet-wide management, but the key is sensitive and may grant broad account authority.

Skill content
CONFIG_FILE="${TS_CONFIG:-$HOME/.clawdbot/credentials/tailscale/config.json}" ... TS_API_KEY=$(jq -r '.apiKey // empty' "$CONFIG_FILE") ... curl ... -u "${TS_API_KEY}:"
Recommendation

Use the least-privileged and shortest-lived Tailscale API key practical, protect the credentials file permissions, and remove or rotate the key when it is no longer needed.

What this means

Setup may be less clear, and users may need to manually create the config file and ensure required tools such as tailscale, curl, and jq are installed.

Why it was flagged

The README references a config.json.example file that is not present in the supplied file manifest, and the registry requirements do not declare the external tools used by the script. This is a minor packaging/provenance gap, not evidence of malicious behavior.

Skill content
cp config.json.example ~/.clawdbot/credentials/tailscale/config.json
Recommendation

Before installing, verify the included script, create the credential file manually if needed, and install only the expected Tailscale tooling from trusted sources.