Skills exe-dev
Manage persistent VMs on exe.dev. Create VMs, configure HTTP proxies, share access, and set up custom domains. Use when working with exe.dev VMs for hosting, development, or running persistent services.
install
source · Clone the upstream repo
git clone https://github.com/openclaw/skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/openclaw/skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/bjesuiter/exe-dev" ~/.claude/skills/clawdbot-skills-exe-dev && rm -rf "$T"
manifest:
skills/bjesuiter/exe-dev/SKILL.mdsource content
⚠️ Warning: This skill was auto-built by clawdbot from the exe.dev markdown documentation. It's not tested yet — use with caution! I plan to test it soon. 🔜
exe.dev VM Management
Quick Commands
| Task | Command |
|---|---|
| List VMs | |
| Create VM | |
| Make public | |
| Change port | |
| Add user | |
| Share link | |
Access URLs
- VM:
https://<vmname>.exe.xyz/ - Shelley agent:
https://<vmname>.exe.xyz:9999/ - VSCode:
vscode://vscode-remote/ssh-remote+<vmname>.exe.xyz/home/exedev
Proxy Configuration
Default port is auto-selected from Dockerfile EXPOSE. Change with:
ssh exe.dev share port <vmname> <port>
Access ports 3000-9999 via
https://vmname.exe.xyz:<port>/
Authentication Headers
When users authenticate via exe.dev:
— user identifierX-ExeDev-UserID
— user emailX-ExeDev-Email
For testing, use mitmproxy to inject headers:
mitmdump --mode reverse:http://localhost:8000 --listen-port 3000 \ --set modify_headers='/~q/X-ExeDev-Email/user@example.com'
Custom Domains
- Subdomains: CNAME
→app.example.comvmname.exe.xyz - Apex: ALIAS
→example.com
+ CNAMEexe.xyz
→wwwvmname.exe.xyz
Full Reference
See references/exe-dev-vm-service.md for complete documentation including pricing, Shelley agent setup, SSH key config, and FAQ.