Openclaw-master-skills domain-dns-ops
install
source · Clone the upstream repo
git clone https://github.com/LeoYeAI/openclaw-master-skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/LeoYeAI/openclaw-master-skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/domain-dns-ops" ~/.claude/skills/leoyeai-openclaw-master-skills-domain-dns-ops && rm -rf "$T"
OpenClaw · Install into ~/.openclaw/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/LeoYeAI/openclaw-master-skills "$T" && mkdir -p ~/.openclaw/skills && cp -r "$T/skills/domain-dns-ops" ~/.openclaw/skills/leoyeai-openclaw-master-skills-domain-dns-ops && rm -rf "$T"
manifest:
skills/domain-dns-ops/SKILL.mdsafety · automated scan (low risk)
This is a pattern-based risk scan, not a security review. Our crawler flagged:
- makes HTTP requests (curl)
Always read a skill's source content before installing. Patterns alone don't mean the skill is malicious — but they warrant attention.
source content
Domain/DNS Ops (Peter)
This skill is a thin router: use
~/Projects/manager as truth, run the repo scripts, follow the checklists.
Source of truth (read first)
(domain -> target map; registrar hints; exclusions)~/Projects/manager/DOMAINS.md
(Cloudflare onboarding + DNS/redirect checklist)~/Projects/manager/DNS.md
+~/Projects/manager/redirect-worker.ts
(worker redirects)~/Projects/manager/redirect-worker-mapping.md
Golden path (new vanity domain -> Cloudflare -> redirect)
- Decide routing model
- Page Rule redirect (small scale, per-zone).
- Rulesets / Bulk Redirects (account-level; needs token perms).
- Worker route (fallback; uses
).redirect-worker
- Cloudflare zone
- Create zone (UI), then confirm with
:cli4cli4 --get name=example.com /zones
- Create zone (UI), then confirm with
- Nameservers
- If registrar = Namecheap:
cd ~/Projects/manager && source profile && bin/namecheap-set-ns example.com emma.ns.cloudflare.com scott.ns.cloudflare.com - If registrar = DNSimple: see
for delegation API notes.~/Projects/manager/DNS.md
- If registrar = Namecheap:
- DNS placeholders (so CF can terminate HTTPS)
- Proxied apex
+ wildcardA
→A
(see192.0.2.1
for exact~/Projects/manager/DNS.md
calls).cli4
- Proxied apex
- Redirect
- If using Page Rules: use the
template fromcli4 --post ... /pagerules
.~/Projects/manager/DNS.md - If using Worker: update mapping (
), deploy/bind routes per~/Projects/manager/redirect-worker-mapping.md
.~/Projects/manager/DNS.md
- If using Page Rules: use the
- Verify
- DNS:
(expect CF anycast).dig +short example.com @1.1.1.1 - HTTPS redirect:
(expectcurl -I https://example.com
).301
- DNS:
Common ops
- Cloudflare token sanity:
(prefersource ~/.profile
;CLOUDFLARE_API_TOKEN
fallback).CF_API_TOKEN - Disable “Block AI bots”:
/cd ~/Projects/manager && source profile && bin/cloudflare-ai-bots status
.bin/cloudflare-ai-bots disable
After edits (commit/push)
If you changed anything in
~/Projects/manager (docs, worker, scripts, mappings): commit there too.
- Review:
cd ~/Projects/manager && git status && git diff - Stage:
git add <paths> - Commit (Conventional Commits):
/git commit -m "feat: …"
/fix:
/docs:chore: - Push only when explicitly asked:
git push origin main
Guardrails
- Don’t touch
lore domains or.md
unless explicitly asked; checksteipete.md
.~/Projects/manager/DOMAINS.md - Confirm registrar before debugging CF “invalid nameservers” (often “wrong registrar”).
- Prefer reversible steps; verify after each change (NS → DNS → redirect).