Tailscale Serve

v1.0.0

Manage multiple paths with tailscale serve, serving files, directories, or ports simultaneously without conflicts and control via background mode.

1· 1.8k·3 current·3 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The SKILL.md contains only tailscale serve CLI usage (serving directories, files, and ports). There are no unexpected binaries, env vars, installs, or unrelated capabilities requested — this matches the skill name.
Instruction Scope
Instructions are narrowly scoped to running tailscale serve commands and checking status. They implicitly assume the tailscale binary is present and the user is authenticated to a Tailscale account; running these commands will expose local files/services to your Tailscale network, so users should avoid serving sensitive paths.
Install Mechanism
No install spec — instruction-only. Nothing is written to disk by the skill itself.
Credentials
The skill declares no environment variables or credentials (proportional). However, it implicitly relies on an authenticated Tailscale daemon/account (not declared), which is expected for tailscale serve but worth noting.
Persistence & Privilege
always is false and there is no install or persistent configuration created by the skill itself. The skill does not request system-wide privileges or modify other skills.
Assessment
This skill is a straightforward cheat-sheet for tailscale serve. Before using it: ensure you have the tailscale binary installed and are logged into your Tailscale account; review the exact paths you plan to serve (avoid ~/ or / or any directories containing secrets); run tailscale serve status first to avoid unintentional overrides; understand that serving a path exposes that content to devices on your Tailscale network; the skill will not install tailscale or manage authentication for you. If you want to test safely, create a small temporary directory with non-sensitive files and try serving that first.

Like a lobster shell, security has layers — review code before you run it.

latestvk979c7rz8bx9ptkrnsysr8n9sh7z85p3

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments