Firewall

v1.0.0

Configure firewalls on servers and cloud providers with security best practices.

4· 1.5k·12 current·13 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description (configure firewalls / best practices) match the SKILL.md content. The skill requests no binaries, env vars, or installs, which is proportionate for a documentation/guidance skill.
Instruction Scope
SKILL.md contains high-level, actionable guidance (ports to avoid/open, provider vs OS firewalls, Docker caveats, IPv6, debugging tips). It does not instruct the agent to read files, access credentials, call external endpoints, run specific commands, or transmit data—staying within the intended advisory scope.
Install Mechanism
No install spec and no code files: lowest-risk model. Nothing will be written to disk or downloaded by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. That is appropriate for a purely instructional guide.
Persistence & Privilege
always is false and the skill does not request persistent presence or modify other skills; autonomous invocation is allowed by default but the skill has no actions to perform, so privilege surface is minimal.
Assessment
This skill is a read-only set of best-practice instructions and will not change your systems or ask for credentials. It can be safely used as a checklist or reference. Important practical notes before acting on the guidance: (1) follow the advice about testing in a second session and keeping provider console access to avoid locking yourself out; (2) the skill does not perform automated changes—if you want automation, use a well-reviewed tool/CLI/UIs from your cloud provider and provide credentials only to those tools; (3) verify provider-specific details in official docs (rule semantics, IPv6 behaviour, Docker interactions) before applying changes; (4) consider testing changes in a staging environment or with a recovery plan in place. If you expected the skill to actually apply firewall rules for you, note that it contains only instructions and will not perform any network or system operations.

Like a lobster shell, security has layers — review code before you run it.

latestvk9718b82kd18cmptq5h6p9wbmh80xx0s

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🛡️ Clawdis
OSLinux · macOS · Windows

Comments