Telnyx Network
Analysis
This skill appears to do what it claims, but it grants high-impact network and privilege control that should be reviewed carefully before installation.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
./add-public-ip.sh ./expose.sh 443 # Now https://64.16.x.x:443 reaches your server
The documented workflow intentionally creates public ingress to local services. This is aligned with the skill purpose, but it is a high-impact network action.
--name) NAME="$2"; shift 2 ;; ... python3 << EOF ... 'name': '$NAME',
The peer name argument is expanded directly into generated Python source rather than passed as encoded data, so a crafted name could alter the Python code path if accepted.
Telnyx CLI not found. Install with: npm install -g @telnyx/api-cli
Some registry/discovery commands depend on a global npm-installed Telnyx CLI that is not reflected in the declared required binaries.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
SUDOERS_LINE="$TARGET_USER ALL=(ALL) NOPASSWD: $WG_PATHS" ... echo "$SUDOERS_LINE" > "$SUDOERS_FILE"
The script installs a persistent sudoers rule allowing passwordless execution of all detected wg and wg-quick binaries for the target user.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
BUCKET="${TELNYX_MESH_BUCKET:-openclaw-mesh}" ... "hostname": "$HOSTNAME" ... telnyx storage object put "$BUCKET" "$TEMP_FILE" -k "nodes/$NODE_NAME.json"The registry publishes node name, mesh IP, hostname, and metadata into a Telnyx Storage bucket used for discovery.
