etcd-manager

v1.0.0

Manage etcd key-value store operations (list, get, put, delete) with safety checks and backup mechanisms. Use when: reading/writing configuration, managing d...

1· 130·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for fpbear/etcd-manager.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "etcd-manager" (fpbear/etcd-manager) from ClawHub.
Skill page: https://clawhub.ai/fpbear/etcd-manager
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install etcd-manager

ClawHub CLI

Package manager switcher

npx clawhub@latest install etcd-manager
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
Name/description match the included scripts and SKILL.md. The helper script and test script implement list/get/put/delete and health checks as described.
Instruction Scope
SKILL.md and scripts stay within etcd operational scope (etcdctl calls, backup-before-write, explicit confirmations recommended). The references show examples that write backups to /var/backup/etcd and mention audit logging, but the included scripts only print old values and do not implement persistent backup/log shipping — review whether you need persistent backups or logging before relying on the skill in production.
!
Install Mechanism
The skill is instruction-only (no formal install spec), which is lower risk, but INSTALL.md contains a placeholder/untrusted download example (https://example.com/openclaw-skill-etcd-1.0.0.tar.gz). The package.json lists 'etcdctl' as a dependency (etcdctl is a system binary, not an npm package). These are likely documentation issues but should be corrected to point to authoritative releases and clear installation steps.
Credentials
The skill declares no required environment variables or credentials, which is reasonable. It does use endpoint URLs and optionally TLS cert file paths (CACERT, CERT, KEY_FILE / ETCD_CA_CERT, ETCD_CLIENT_CERT, ETCD_CLIENT_KEY) but treats them as optional; confirm you will provide appropriate TLS files for production clusters. The skill does not request unrelated credentials.
Persistence & Privilege
always:false and no modifications to other skills or global configuration. The skill does not request permanent elevated privileges or automatic inclusion.
Assessment
This etcd-manager skill appears to do what it claims: it runs etcdctl commands with sensible safety rules. Before installing, check three things: (1) fix the INSTALL.md download placeholder and only install packages from a trusted release/source (the README/package.json currently point to example/GitHub placeholders), (2) decide where and how you want backups/audit logs persisted (the scripts only print old values; the docs contain sample backup-to-/var/backup which would require write permissions), and (3) provide TLS cert paths or endpoint credentials for production clusters — the skill expects you to supply them but does not store or request secrets itself. If you need stricter assurance, ask the maintainer for signed release artifacts and a clear install URL and confirm any backup/logging behavior before running in production.

Like a lobster shell, security has layers — review code before you run it.

latestvk97607axxxywffb461sff3pprd83gqq4
130downloads
1stars
1versions
Updated 1mo ago
v1.0.0
MIT-0

etcd Skill

A clean and safe etcd management skill for OpenClaw.

Safety Rules

  1. Read-first: Always prefer read operations (list, get) over write operations
  2. Backup before modification: Always show old value before put/delete
  3. Production protection: Be extra cautious with prod environments
  4. Explicit confirmation: Require clear user intent for destructive operations

Command Conventions

List keys by prefix

etcdctl --endpoints="$ENDPOINTS" get "$PREFIX" --prefix --keys-only

Get key and value

etcdctl --endpoints="$ENDPOINTS" get "$KEY"

Put key (with backup)

# Show old value first
etcdctl --endpoints="$ENDPOINTS" get "$KEY" || true
# Write new value
etcdctl --endpoints="$ENDPOINTS" put "$KEY" "$VALUE"

Delete key (with backup)

# Backup old value
etcdctl --endpoints="$ENDPOINTS" get "$KEY" || true
# Delete
etcdctl --endpoints="$ENDPOINTS" del "$KEY"

For TLS connections, add:

--cacert="$CACERT" --cert="$CERT" --key="$KEY_FILE"

Workflow

  1. Environment identification: Determine if this is dev/test/prod
  2. Safety check: Verify operation safety based on environment
  3. Backup: For write operations, show current state
  4. Execution: Perform the requested operation
  5. Verification: Confirm the operation succeeded

Output Format

Use standardized output format:

【ETCD 操作结果】

1. 操作信息
- 环境:
- Endpoint:
- Action:
- Prefix:
- Key:

2. 执行结果
- 状态:成功 / 失败
- 摘要:

3. 数据
- Key 列表:
- 原值:
- 新值:
- 删除前备份:

4. 风险提示
- 

5. 备注
- 

Examples

List keys

请使用etcd技能:
- 操作:list
- 环境:test
- 端点:http://etcd-test:2379
- 前缀:/app/config/

Get value

请使用etcd技能:
- 操作:get
- 环境:prod
- 端点:https://etcd-prod:2379
- key:/app/config/database

Put value

请使用etcd技能:
- 操作:put
- 环境:dev
- 端点:http://localhost:2379
- key:/test/key
- value:test_value

Delete key

请使用etcd技能:
- 操作:delete
- 环境:test
- 端点:http://etcd-test:2379
- key:/test/old_key

Notes

  • Always use etcdctl version 3.6.1 or higher
  • For production environments, consider using TLS
  • The skill includes built-in backup mechanisms
  • Operations are logged for audit purposes

Comments

Loading comments...