WireGuard

v1.0.0

Configure WireGuard VPN tunnels with secure routing and key management.

3· 1.1k·6 current·6 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the contents: the SKILL.md is a WireGuard troubleshooting and configuration guide. The declared required binary is 'wg', which is appropriate. Minor inconsistency: the instructions also reference 'wg-quick' and other tools (iptables/NAT, sysctl for IP forwarding) but the metadata only lists 'wg' — not a security problem but worth noting because some guidance assumes presence of additional binaries/utilities.
Instruction Scope
SKILL.md is high-level operational guidance (AllowedIPs, routing, DNS leaks, key security, debugging tips) and does not instruct the agent to read unrelated files, exfiltrate data, or access environment variables. It references config files and permissions but does not direct the agent to transmit secrets. Advice to keep private keys secret is explicit.
Install Mechanism
No install spec (instruction-only). Nothing is downloaded or written to disk by the skill itself; lowest-risk install profile.
Credentials
The skill requires no environment variables or credentials. That matches its purpose: configuring WireGuard locally does not need external API keys. No unrelated secrets requested.
Persistence & Privilege
always:false and default model invocation settings are appropriate. The skill does not request persistent system-wide privileges or modify other skills' configs.
Assessment
This is a coherent, instruction-only WireGuard guide. Before using it: ensure the 'wg' (and likely 'wg-quick', iptables/nft, and sysctl) tools are installed on your system; never paste or share private keys (generate them locally); be prepared that following the guidance may require running privileged commands (changing file perms, enabling IP forwarding, firewall/NAT changes) — run those yourself or only allow the agent to perform them if you trust it. The skill itself does not ask for credentials or perform network exfiltration, but it assumes you will run networking commands on the host, so review any concrete commands the agent proposes before executing.

Like a lobster shell, security has layers — review code before you run it.

latestvk97e8nxz285pt9mq516sxpbbqx80x7cr

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🔐 Clawdis
OSLinux · macOS · Windows
Binswg

Comments