Telnyx Network

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

The skill is mostly aligned with Telnyx/WireGuard networking, but it grants persistent elevated network control and makes a firewall safety claim that the included scripts do not clearly enforce.

Review this skill before installing. It is not clearly malicious, but it changes local networking, may expose services to the internet, can incur Telnyx charges, and can add persistent passwordless sudo for WireGuard. Verify firewall behavior yourself and remove the sudoers rule when finished.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user may expose a machine believing only selected ports are reachable, when the included implementation does not clearly enforce that guarantee.

Why it was flagged

This strong safety claim is not clearly backed by the provided scripts: expose.sh appends ACCEPT rules for selected ports, but the artifacts do not show a corresponding default-deny firewall rule for the WireGuard interface.

Skill content
Only explicitly exposed ports accept traffic on the WireGuard interface. All other ports are blocked by default.
Recommendation

Before using public exposure, verify the actual firewall policy on the WireGuard interface and add explicit default-deny rules if needed.

What this means

After setup, the agent can make privileged network-interface changes without an interactive sudo prompt.

Why it was flagged

The script creates a persistent sudoers rule allowing the user, and therefore the agent acting as that user, to run WireGuard commands without a password, with no argument or config-path restriction shown.

Skill content
SUDOERS_LINE="$TARGET_USER ALL=(ALL) NOPASSWD: $WG_PATHS"
Recommendation

Only run setup-sudoers.sh if you need autonomous WireGuard control, review the generated sudoers file, restrict it where possible, and remove it when no longer needed.

What this means

Using the skill can create or delete Telnyx resources and may incur monthly charges.

Why it was flagged

The skill uses the Telnyx API key to create cloud network resources, including a WireGuard gateway that the documentation says costs money.

Skill content
curl -s -X POST "$API_BASE/networks" ... curl -s -X POST "$API_BASE/wireguard_interfaces"
Recommendation

Use a Telnyx key with the least privileges available, monitor billing, and require explicit user approval before creating or deleting resources.

What this means

Other nodes in the mesh registry may be treated as reachable peers, so incorrect or untrusted registrations could affect agent-to-agent workflows.

Why it was flagged

The skill intentionally supports inter-agent discovery through a Telnyx Storage registry, which is useful for the stated purpose but introduces identity and trust-boundary considerations.

Skill content
This enables OpenClaw instances to automatically discover and communicate with each other.
Recommendation

Use a private, access-controlled bucket, register only trusted nodes, and do not treat discovered peers as trusted without additional authentication.

What this means

Users may need to install an extra global npm package to use all features.

Why it was flagged

Some registry commands rely on a globally installed Telnyx CLI even though the top-level requirements only declare the wg binary.

Skill content
Telnyx CLI not found. Install with: npm install -g @telnyx/api-cli
Recommendation

Install the Telnyx CLI only from the official package source and confirm the version before using registry features.