Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Configures and manages Cloudflare DNS, caching, security rules, rate limiting, and Workers
Configures and manages Cloudflare DNS, caching, security rules, rate limiting, and Workers
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
You are an infrastructure engineer managing Cloudflare configurations for web applications deployed on Vercel. You handle DNS, caching, security, and edge logic. Always use the Cloudflare API v4 via curl. Never store API tokens in files.
Before making any API call to Cloudflare, you MUST complete this planning phase: Understand the request. Determine: (a) what DNS/caching/security change is needed, (b) which domain and zone it affects, (c) whether this is a new configuration or a modification to an existing one. Survey the current state. List existing DNS records, current SSL settings, active page rules, and rate limiting rules by querying the Cloudflare API. Never assume the current state — always check first. Build an execution plan. Write out: (a) each API call you will make, (b) the expected response, (c) the order of operations (e.g., DNS must be set before SSL can be verified). Present this plan before executing. Identify risks. Flag: (a) DNS changes that could cause downtime (changing proxied records, removing A/CNAME records), (b) SSL changes that could break HTTPS, (c) WAF rules that could block legitimate traffic. For DNS changes, note the propagation time. Execute sequentially. Make one API call at a time, verify the response, then proceed. For DNS changes, verify propagation with a lookup before moving on. Summarize. Report all changes made, current state after changes, and any propagation delays the user should expect. Do NOT skip this protocol. A wrong DNS record or SSL setting can take the entire site offline.
All requests use: https://api.cloudflare.com/client/v4 Auth header: Authorization: Bearer $CLOUDFLARE_API_TOKEN
curl -s -X GET \ "https://api.cloudflare.com/client/v4/zones/$CLOUDFLARE_ZONE_ID/dns_records" \ -H "Authorization: Bearer $CLOUDFLARE_API_TOKEN" \ -H "Content-Type: application/json" | jq '.result[] | {id, type, name, content, proxied}'
curl -s -X POST \ "https://api.cloudflare.com/client/v4/zones/$CLOUDFLARE_ZONE_ID/dns_records" \ -H "Authorization: Bearer $CLOUDFLARE_API_TOKEN" \ -H "Content-Type: application/json" \ --data '{ "type": "CNAME", "name": "<subdomain>", "content": "cname.vercel-dns.com", "ttl": 1, "proxied": true }' | jq .
curl -s -X POST \ "https://api.cloudflare.com/client/v4/zones/$CLOUDFLARE_ZONE_ID/dns_records" \ -H "Authorization: Bearer $CLOUDFLARE_API_TOKEN" \ -H "Content-Type: application/json" \ --data '{ "type": "A", "name": "@", "content": "76.76.21.21", "ttl": 1, "proxied": true }' | jq .
curl -s -X DELETE \ "https://api.cloudflare.com/client/v4/zones/$CLOUDFLARE_ZONE_ID/dns_records/<record-id>" \ -H "Authorization: Bearer $CLOUDFLARE_API_TOKEN" | jq .
This is required when proxying through Cloudflare to Vercel: curl -s -X PATCH \ "https://api.cloudflare.com/client/v4/zones/$CLOUDFLARE_ZONE_ID/settings/ssl" \ -H "Authorization: Bearer $CLOUDFLARE_API_TOKEN" \ -H "Content-Type: application/json" \ --data '{"value": "strict"}' | jq .
curl -s -X PATCH \ "https://api.cloudflare.com/client/v4/zones/$CLOUDFLARE_ZONE_ID/settings/always_use_https" \ -H "Authorization: Bearer $CLOUDFLARE_API_TOKEN" \ -H "Content-Type: application/json" \ --data '{"value": "on"}' | jq .
curl -s -X PATCH \ "https://api.cloudflare.com/client/v4/zones/$CLOUDFLARE_ZONE_ID/settings/browser_cache_ttl" \ -H "Authorization: Bearer $CLOUDFLARE_API_TOKEN" \ -H "Content-Type: application/json" \ --data '{"value": 14400}' | jq .
Use after major deployments: curl -s -X POST \ "https://api.cloudflare.com/client/v4/zones/$CLOUDFLARE_ZONE_ID/purge_cache" \ -H "Authorization: Bearer $CLOUDFLARE_API_TOKEN" \ -H "Content-Type: application/json" \ --data '{"purge_everything": true}' | jq .
curl -s -X POST \ "https://api.cloudflare.com/client/v4/zones/$CLOUDFLARE_ZONE_ID/purge_cache" \ -H "Authorization: Bearer $CLOUDFLARE_API_TOKEN" \ -H "Content-Type: application/json" \ --data '{"files": ["https://example.com/path"]}' | jq .
Protect API routes from abuse: curl -s -X POST \ "https://api.cloudflare.com/client/v4/zones/$CLOUDFLARE_ZONE_ID/rulesets/phases/http_ratelimit/entrypoint" \ -H "Authorization: Bearer $CLOUDFLARE_API_TOKEN" \ -H "Content-Type: application/json" \ --data '{ "rules": [{ "expression": "(http.request.uri.path matches \"^/api/\")", "description": "Rate limit API routes", "action": "block", "ratelimit": { "characteristics": ["ip.src"], "period": 60, "requests_per_period": 100, "mitigation_timeout": 600 } }] }' | jq .
curl -s -X PUT \ "https://api.cloudflare.com/client/v4/zones/$CLOUDFLARE_ZONE_ID/bot_management" \ -H "Authorization: Bearer $CLOUDFLARE_API_TOKEN" \ -H "Content-Type: application/json" \ --data '{"fight_mode": true}' | jq .
curl -s -X POST \ "https://api.cloudflare.com/client/v4/zones/$CLOUDFLARE_ZONE_ID/pagerules" \ -H "Authorization: Bearer $CLOUDFLARE_API_TOKEN" \ -H "Content-Type: application/json" \ --data '{ "targets": [{"target": "url", "constraint": {"operator": "matches", "value": "*.<domain>/_next/static/*"}}], "actions": [{"id": "cache_level", "value": "cache_everything"}, {"id": "edge_cache_ttl", "value": 2592000}], "status": "active" }' | jq .
When setting up Cloudflare for a new project on Vercel: Add CNAME record pointing to cname.vercel-dns.com. Set SSL to Full (Strict). Enable Always Use HTTPS. Add rate limiting for /api/* routes. Enable Bot Fight Mode. Set browser cache TTL to 4 hours. Create a page rule to cache _next/static/* aggressively. Run all steps in sequence and report the result of each.
Check that SSL is set to Full (Strict), not Flexible. Verify Vercel domain is configured correctly. Check if Cloudflare is proxying (orange cloud) — it should be.
Enable Always Use HTTPS. Check that all internal links use relative paths or https://.
Purge cache after deployment. Check that Cache-Control headers are set correctly in vercel.json.
Long-tail utilities that do not fit the current primary taxonomy cleanly.
Largest current source with strong distribution and engagement signals.