install
source · Clone the upstream repo
git clone https://github.com/openclaw/skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/openclaw/skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/aronchick/expanso-tls-inspect" ~/.claude/skills/openclaw-skills-expanso-tls-inspect-014536 && rm -rf "$T"
OpenClaw · Install into ~/.openclaw/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/openclaw/skills "$T" && mkdir -p ~/.openclaw/skills && cp -r "$T/skills/aronchick/expanso-tls-inspect" ~/.openclaw/skills/openclaw-skills-expanso-tls-inspect-014536 && rm -rf "$T"
manifest:
skills/aronchick/expanso-tls-inspect/SKILL.mdsource content
tls-inspect
Inspect TLS certificate (expiry, SANs, chain, cipher)
Requirements
- Expanso Edge installed (
binary in PATH)expanso-edge - Install via:
clawhub install expanso-edge
Usage
CLI Pipeline
# Run standalone echo '<input>' | expanso-edge run pipeline-cli.yaml
MCP Pipeline
# Start as MCP server expanso-edge run pipeline-mcp.yaml
Deploy to Expanso Cloud
expanso-cli job deploy https://skills.expanso.io/tls-inspect/pipeline-cli.yaml
Files
| File | Purpose |
|---|---|
| Skill metadata (inputs, outputs, credentials) |
| Standalone CLI pipeline |
| MCP server pipeline |