Install
openclaw skills install proxyMeta-skill for secure network tunnel setup, geo-access diagnostics, and leak-aware task resumption by orchestrating shell-scripting, curl-http, wireguard, tailscale, dns, ipinfo, and moltguard. Use when users need controlled VPN switching, region verification, DNS safety checks, and automatic retry of previously blocked workflows.
openclaw skills install proxyEstablish a secure, verified path when access is blocked by geo/IP policy, then resume the blocked workflow safely and audibly.
Primary outcomes:
This is an orchestration skill. It does not guarantee legal access to restricted services.
Core diagnostics/orchestration:
shell-scripting (inspected latest: 1.0.0)curl-http (inspected latest: 1.0.0)Tunnel path options (at least one):
wireguard (inspected latest: 1.0.0)tailscale (inspected latest: 1.0.0)Safety and verification extensions:
dns (inspected latest: 1.0.0)ipinfo (inspected latest: 1.0.0)moltguard (inspected latest: 6.0.2, optional but recommended)Install/update:
npx -y clawhub@latest install shell-scripting
npx -y clawhub@latest install curl-http
npx -y clawhub@latest install wireguard
npx -y clawhub@latest install tailscale
npx -y clawhub@latest install dns
npx -y clawhub@latest install ipinfo
npx -y clawhub@latest install moltguard
npx -y clawhub@latest update --all
Verify:
npx -y clawhub@latest list
Required access:
nordvpn/mullvad/expressvpn or wg or tailscale)Optional keys:
MOLTGUARD_API_KEY (if MoltGuard remote detection mode is enabled)IPINFO_TOKEN (optional, higher quota geolocation verification)Preflight:
command -v nordvpn || command -v mullvad || command -v expressvpn || command -v wg || command -v tailscale
echo "$MOLTGUARD_API_KEY" | wc -c
echo "$IPINFO_TOKEN" | wc -c
Mandatory behavior:
MissingAPIKeys and/or MissingCredentials with blocked stages.Partial when needed.Before any tunnel switch, confirm and record:
If acknowledgment is missing:
blocked_url or blocked_endpointblocked_task_name (example: prediction-market-arbitrage)target_regiontunnel_path (provider-cli, wireguard, tailscale-exit-node)provider_or_profile (provider name, WG profile, or exit-node name)risk_mode (diagnose-only, switch-and-verify, switch-and-resume)kill_switch_required (yes/no)max_retries (default: 2)Do not execute switching before tunnel path and target region are explicit.
Use as control plane:
Use for protocol-level evidence:
403/geo-block signature capture,Use when deterministic profile-based tunnels are required:
Use for tailnet and exit-node path:
tailscale up --exit-node=<node>,tailscale ping/status,Use for DNS leak and propagation sanity guidance:
Use for geo-attestation:
Use as prompt/tool security guardrail:
Important limitation:
Block Detectiongeo_block, ip_block, auth_block, or other_http_error.Baseline SnapshotTunnel Path SelectionTunnel ActivationGeo and IP Verificationipinfo.io + optional token),DNS Safety CheckAccess RetestTask Resumptionswitch-and-resume mode),Suggested verification commands:
curl -s ifconfig.me
curl -s https://ipinfo.io/json
curl -I "${BLOCKED_URL}"
Minimum checks before success:
If kill-switch is required but not supported/verified:
Needs Review and avoid high-risk task resumption.Always return:
BlockDiagnosis
TunnelPath
TunnelStatus
DNSSafety
low|medium|high)SecurityStatus
enabled, gateway-only, disabled)AccessRetest
TaskResumption
NextActions
Before final output, verify:
If any gate fails, return Needs Revision with concrete missing checks.
MissingCredentials with concrete install/profile steps.MissingCredentials, skip switching stage.MOLTGUARD_API_KEY in detection mode: return MissingAPIKeys, continue with gateway-only or disabled mode.