NAS

v1.0.0

Configure, secure, and optimize network attached storage with proper backup strategy, remote access, and media serving.

0· 690·0 current·0 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (NAS administration, backup, remote access, media serving) matches the contents of SKILL.md and the bundled docs (apps.md, backup.md, media.md, security.md). All referenced services (WireGuard, Tailscale, B2/S3, LetsEncrypt, Plex/Jellyfin) are reasonable for the stated purpose.
Instruction Scope
All runtime instructions are guidance and config examples for NAS administration (YAML snippets, folder layouts, checklist items). The docs do not instruct the agent to read local files, access unrelated system credentials, exfiltrate data, or call hidden endpoints. They do recommend using third-party services (cloud backups, tunnels), which is expected for a NAS guide.
Install Mechanism
This is an instruction-only skill with no install spec and no code files to download or execute. That minimizes on-disk execution risk.
Credentials
The skill declares no required environment variables, credentials, or config paths. Mentions of cloud providers and VPNs are contextual recommendations, not requests for secrets or platform credentials.
Persistence & Privilege
The skill is not marked always:true and does not request persistent system privileges or to modify other skills. Model invocation is allowed (normal default) but there are no capabilities here that would leverage elevated persistent access.
Assessment
This skill is a set of written best-practices and configuration examples for NAS administration and appears internally consistent. However: the publisher and homepage are unknown — treat the content as unverified advice and cross-check against vendor documentation before applying changes. Because it references cloud services and remote-access tools, never paste live credentials into a skill prompt and verify any commands/configs in a safe test environment (or snapshot) before applying to production data. If you need automated actions (scripts, installers) prefer vetted packages or vendor tools rather than copying commands verbatim from an unverified source.

Like a lobster shell, security has layers — review code before you run it.

latestvk9736bxvw7d7nq0bm8y3s8kdbx81636n

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🗄️ Clawdis
OSLinux · macOS · Windows

Comments