Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Hostinger VPS MCP Tools

v1.0.0

Set up Hostinger VPS servers as AI virtual employees with GUI and Koda (OpenClaw). Use when deploying new VPS instances, setting up remote desktops, installi...

0· 414·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for maverick-software/hostinger-vps-mcp-tools.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Hostinger VPS MCP Tools" (maverick-software/hostinger-vps-mcp-tools) from ClawHub.
Skill page: https://clawhub.ai/maverick-software/hostinger-vps-mcp-tools
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install hostinger-vps-mcp-tools

ClawHub CLI

Package manager switcher

npx clawhub@latest install hostinger-vps-mcp-tools
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name/description match the included scripts and UI code: the package provisions Hostinger VPS via mcporter/Hostinger MCP and configures a GUI, Docker, Koda (OpenClaw) containers, VPN/tunnels, and identity files. That's coherent with the stated purpose. Minor mismatch: the skill declares no required environment variables in metadata, yet the runtime depends on a Hostinger API token (entered via the UI and stored in the vault).
!
Instruction Scope
SKILL.md and the scripts instruct the agent/user to perform many privileged operations on a target VPS as root: create a 'koda' user with NOPASSWD sudo, change SSH port, enable XRDP and open RDP port, install Docker and build containers, add SSH keys and disable password auth, and modify system networking/firewall. The instructions also write and read vault and mcporter config files under the agent/home directory. These actions are expected for a full VPS deploy, but they are high‑impact and not narrowly scoped — e.g., passwordless sudo and an RDP server exposed by default increase attack surface and deserve explicit user warning and opt-in.
!
Install Mechanism
There is no central 'install' spec for the skill, but the scripts perform remote installs on the VPS using apt and a number of network installs (curl | sh for Docker and Tailscale, downloading cloudflared .deb from GitHub releases). Curl‑pipe‑to‑sh and remote package installs are common for one‑shot provisioning but carry supply‑chain risk and should be audited by the user before running on production systems.
!
Credentials
Although metadata lists no required env vars, the skill absolutely expects a Hostinger API token to be entered in the UI and persisted to ~/.openclaw/secrets.json. The backend code also reads/writes various config paths (mcporter configs in several candidate locations and the secrets vault) and will modify mcporter configuration (mcpServers). That is reasonable for an integration but is still broad: it writes tokens and alters a shared mcporter config which may affect other integrations. The skill also offers optional integration with third‑party MCPs (Zapier/Pipedream) that would require user-supplied endpoints/keys.
!
Persistence & Privilege
The skill modifies local agent files (writes secrets.json vault entries and mcporter config under the user's home workspace). While adding its own config is expected for integrations, it does edit a shared mcporter config (potentially impacting other MCP entries) and writes persistent credentials into the agent vault. The skill is not marked always:true, and it does not autonomously escalate that flag, but persistent access to the vault and to mcporter configuration increases the blast radius if misused.
What to consider before installing
Before using this skill, be aware it will perform many root‑level changes on a VPS and add persistent configuration/credentials to your agent environment. Recommendations: - Inspect every script (deploy-all.sh and all scripts it calls) locally before running and remove or modify steps you don’t want (e.g., the NOPASSWD sudo line). - Treat the initial runs as happening on a disposable/test VPS. Don’t run on production machines until you’re comfortable. - Consider removing or changing the sudo NOPASSWD for the 'koda' user and avoid exposing XRDP (port 3389) publicly. Prefer VPN/tunnel (Tailscale/WireGuard/Cloudflare Tunnel) and then run lockdown steps. - Audit any curl | sh installers (get.docker.com, tailscale install script) or replace them with package manager installs you control. - Note the skill will ask you to provide a Hostinger API token via the UI and will store it in ~/.openclaw/secrets.json; if you have other mcporter integrations, be aware the skill will create/edit mcporter config entries which could affect them. - If you want stronger safety: run scripts line-by-line manually over an SSH session rather than running deploy-all.sh, and avoid installing optional third‑party MCP integrations (Zapier/Pipedream) unless needed. If you want me to, I can walk through the most sensitive lines and suggest safe edits (e.g., remove NOPASSWD, avoid exposing XRDP, replace curl|sh installs, or run Docker without adding the user to the docker group).

Like a lobster shell, security has layers — review code before you run it.

latestvk970nqngx3bm89c0edjjkfsjm5822b3p
414downloads
0stars
1versions
Updated 6h ago
v1.0.0
MIT-0

Hostinger VPS Deploy

Deploy Koda (OpenClaw) on Hostinger VPS servers with GUI access for AI virtual employees.

Overview

This skill automates:

  1. API-driven provisioning — Deploy VPS instances via Hostinger API MCP tools
  2. Server hardening — SSH keys, firewall, fail2ban
  3. GUI installation — XFCE desktop + VNC/XRDP for remote access
  4. Docker setup — Container runtime for Koda
  5. Koda deployment — AI assistant with webchat interface
  6. Identity config — Unique name/persona for each virtual employee

Hostinger API Integration (MCP)

Dashboard Tab

OpenClaw has a built-in Hostinger tab in the Control dashboard (Integrations group).

From the tab you can:

  • Enter your Hostinger API token (stored securely in vault)
  • Set your GitHub repo URL (OpenClaw fork to install on new VPS instances)
  • View all available MCP tools grouped by category
  • Reference the Key VPS Tools quick guide

Getting Your API Token

  1. Log into hPanel
  2. Go to API Tokens → Create new token
  3. Copy the token and paste it in the OpenClaw Hostinger tab

MCP Server

The hostinger-api-mcp npm package is Hostinger's official MCP server.

  • Install: npm install -g hostinger-api-mcp (already installed)
  • Auth: Bearer token via API_TOKEN env var
  • Transport: stdio (default) or HTTP streaming

Important: The API token is stored in ~/.openclaw/secrets.json (the vault), not in plaintext in mcporter config. A SecretRef points to the vault key HOSTINGER_API_TOKEN.

Key API Endpoints

ToolMethodPath
vps_getVirtualMachineListV1GET/api/vps/v1/virtual-machines
vps_createVirtualMachineV1POST/api/vps/v1/virtual-machines
vps_getDataCenterListV1GET/api/vps/v1/data-centers
vps_getOsListV1GET/api/vps/v1/os
vps_startVirtualMachineV1POST/api/vps/v1/virtual-machines/{id}/start
vps_stopVirtualMachineV1POST/api/vps/v1/virtual-machines/{id}/stop
vps_restartVirtualMachineV1POST/api/vps/v1/virtual-machines/{id}/restart
vps_resetPasswordV1POST/api/vps/v1/virtual-machines/{id}/reset-password
vps_getMetricsV1GET/api/vps/v1/virtual-machines/{id}/metrics
billing_getCatalogItemListV1GET/api/billing/v1/catalog
billing_getPaymentMethodListV1GET/api/billing/v1/payment-methods

Using Tools via mcporter

# List all VPS instances
mcporter call hostinger-api.vps_getVirtualMachineListV1

# View available VPS plans (prices in cents)
mcporter call hostinger-api.billing_getCatalogItemListV1 category=VPS

# List data centers
mcporter call hostinger-api.vps_getDataCenterListV1

# List OS options
mcporter call hostinger-api.vps_getOsListV1

# Deploy a new VPS (requires plan item ID, OS ID, datacenter ID)
mcporter call hostinger-api.vps_createVirtualMachineV1 ...

API Documentation Links

ResourceURL
API Referencehttps://developers.hostinger.com/
Overviewhttps://developers.hostinger.com/#description/overview
Authenticationhttps://developers.hostinger.com/#description/authentication
SDKs & Toolshttps://developers.hostinger.com/#description/sdks--tools
Official MCP Server (GitHub)https://github.com/hostinger/api-mcp-server
Postman Collectionhttps://app.getpostman.com/run-collection/36145449-4a733c4f-6704-49f6-832a-0ccd28c37021
hPanel API Tokenshttps://hpanel.hostinger.com/api-tokens

VPS Deployment Workflow

Step 1: Get a VPS

# 1. Check available plans
mcporter call hostinger-api.billing_getCatalogItemListV1 category=VPS

# 2. Pick a data center
mcporter call hostinger-api.vps_getDataCenterListV1

# 3. Pick an OS (Ubuntu 24.04 recommended)
mcporter call hostinger-api.vps_getOsListV1

# 4. Deploy
mcporter call hostinger-api.vps_createVirtualMachineV1 \
  --args '{"plan":"...", "datacenter_id": "...", "os_id": "..."}'

Step 2: Set Up the Server

Once the VPS is running (get IP from vps_getVirtualMachineListV1):

# One-command full deploy
scripts/deploy-all.sh SERVER_IP "Agent Name" [KODA_PORT] [SSH_PORT]

# Examples:
scripts/deploy-all.sh 1.2.3.4 "Alex"
scripts/deploy-all.sh 1.2.3.4 "Alex" 9443 2222

Step 3: Install OpenClaw Fork

If a GitHub repo is configured (via the Hostinger tab), Koda will:

  1. SSH into the new VPS
  2. Clone the configured repo (e.g., https://github.com/your-org/openclaw)
  3. Run the install script

Manual Step-by-Step Scripts

# 1. Initial server setup (with custom ports)
ssh root@SERVER_IP 'bash -s 9443 2222' < scripts/01-server-setup.sh

# 2. Install GUI + remote desktop
ssh -p 2222 root@SERVER_IP 'bash -s' < scripts/02-install-gui.sh

# 3. Install Docker
ssh -p 2222 root@SERVER_IP 'bash -s' < scripts/03-install-docker.sh

# 4. Deploy Koda (with custom port)
ssh -p 2222 root@SERVER_IP 'bash -s 9443' < scripts/04-deploy-koda.sh

# 5. Configure identity
ssh -p 2222 root@SERVER_IP 'bash -s' < scripts/05-configure-identity.sh "Agent Name"

Scripts

ScriptPurpose
01-server-setup.shUpdates, firewall, fail2ban, create user
02-install-gui.shXFCE desktop + XRDP (Windows Remote Desktop)
03-install-docker.shDocker + Docker Compose
04-deploy-koda.shPull/build Koda, start container
05-configure-identity.shSet agent name, create workspace
deploy-all.shRun all scripts in sequence

Connecting to Your VPS

After deployment:

  • Remote Desktop (RDP): Connect with Windows Remote Desktop or Remmina to SERVER_IP:3389
  • VNC: Connect to SERVER_IP:5901 (if VNC installed)
  • Webchat: Open http://SERVER_IP:18789 in browser
  • SSH: ssh koda@SERVER_IP

Default credentials (change after first login):

  • Username: koda
  • Password: Set during deployment

Firewall Ports

PortServiceCustomizable
22 (default)SSH✅ Set via SSH_PORT
3389XRDP (Remote Desktop)
18789 (default)Koda webchat✅ Set via KODA_PORT

Security

Vault Storage

The Hostinger API token is stored in ~/.openclaw/secrets.json under the key HOSTINGER_API_TOKEN. It is never stored in plaintext in mcporter.json — only a SecretRef pointer is stored there.

Post-Deployment Hardening

# Tailscale (zero-trust VPN — recommended)
ssh root@SERVER_IP 'bash -s' < scripts/security/setup-tailscale.sh
ssh root@SERVER_IP 'bash -s' < scripts/security/lockdown-public.sh

# Or: Cloudflare Tunnel for HTTPS
ssh root@SERVER_IP 'bash -s' < scripts/security/setup-cloudflare-tunnel.sh
ScriptPurpose
security/setup-ssh-keys.shSSH key-only auth
security/setup-tailscale.shZero-trust VPN mesh
security/setup-cloudflare-tunnel.shHTTPS via Cloudflare
security/setup-wireguard.shSelf-hosted VPN
security/setup-https.shLet's Encrypt SSL + Nginx
security/harden-server.shKernel hardening, auto-updates
security/lockdown-public.shRemove all public port access

Reference Files

FilePurpose
references/hostinger-backend.tsGateway RPC handlers for Hostinger API
references/hostinger-views.tsUI tab rendering (Lit)
references/hostinger-controller.tsUI state management
references/hostinger-notes.mdhPanel navigation notes
references/identity-setup.mdPer-agent identity configuration
references/security-options.mdSecurity comparison guide

VPS Plans

Recommended for Koda/OpenClaw:

  • KVM 2 (2 GB RAM) — Minimum for headless Koda
  • KVM 4 (4 GB RAM) — Recommended for GUI + Koda
  • KVM 8 (8 GB RAM) — Comfortable for heavy workloads

OS: Ubuntu 22.04 or 24.04 LTS


Troubleshooting

Can't connect via RDP?

  • Ensure port 3389 is open: sudo ufw status
  • Check XRDP status: sudo systemctl status xrdp

Koda not starting?

  • Check Docker: docker ps
  • View logs: docker logs koda

GUI slow?

  • XFCE is lightweight but VPS needs 2GB+ RAM
  • Consider headless mode if GUI not needed

MCP tools not loading?

  • Verify token is saved: check ~/.openclaw/secrets.json for HOSTINGER_API_TOKEN
  • Run: API_TOKEN=your-token mcporter list hostinger-api

Comments

Loading comments...