Nginx
v1.0.1Configure Nginx for reverse proxy, load balancing, SSL termination, and high-performance static serving.
⭐ 5· 2.5k·22 current·22 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description match the included documentation (proxy, ssl, performance, examples). The files only cover nginx config topics; there are no unrelated required binaries, environment variables, or capabilities.
Instruction Scope
The SKILL.md and companion files provide configuration guidance and call out nginx-specific paths (e.g., includes under /etc/nginx/conf.d/) and commands (e.g., nginx -t, nginx -s reload). Those references are appropriate for an nginx guide and do not instruct reading or exfiltrating unrelated secrets or contacting external endpoints.
Install Mechanism
No install spec and no code files — instruction-only. This is the lowest-risk installation model because nothing is written or executed by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths beyond standard nginx locations mentioned in documentation. There are no disproportionate credential requests.
Persistence & Privilege
always:false and user-invocable. The skill does not request permanent platform presence or attempt to modify other skills or global agent settings. Autonomous invocation is permitted by platform default but not a concern here given the skill's instruction-only nature.
Assessment
This skill is a documentation-only Nginx guide and appears coherent. Before giving an agent permission to apply changes based on these instructions: (1) review any concrete config edits the agent proposes, (2) test changes in a staging environment and run nginx -t before reloads, (3) back up existing nginx configs, and (4) keep private keys and certificates secure — do not allow the agent to expose or transmit private keys. If you only need advice, prefer read-only interactions rather than letting the agent modify system files.Like a lobster shell, security has layers — review code before you run it.
latestvk970ptakst9pg4c28v3dx2yses812c3d
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
