Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Manage Cloudflare domains, DNS records, SSL settings, zone configuration, firewall rules, tunnels, and analytics via the Cloudflare API. Use when the user as...
Manage Cloudflare domains, DNS records, SSL settings, zone configuration, firewall rules, tunnels, and analytics via the Cloudflare API. Use when the user as...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Manage Cloudflare zones, DNS, SSL, tunnels, and settings via the bundled scripts/cf.sh bash script.
curl, jq, and openssl must be available on the system Set CLOUDFLARE_API_TOKEN environment variable Optionally set CLOUDFLARE_ACCOUNT_ID for tunnel operations
All operations go through the bundled scripts/cf.sh bash script (included in this skill). No external downloads needed. # Run from skill directory ./scripts/cf.sh <command> [args...] # Or reference by absolute path /path/to/skills/cloudflare/scripts/cf.sh <command> [args...]
CommandArgsDescriptionhelpShow all commandsverifyVerify API token is validzones[domain]List zones (optionally filter by domain name)zone-get<zone_id>Get zone detailszone-id<domain>Get zone ID from domain namedns-list<zone_id> [type] [name]List DNS recordsdns-create<zone_id> <type> <name> <content> [proxied] [ttl]Create DNS recorddns-update<zone_id> <record_id> <type> <name> <content> [proxied] [ttl]Update DNS recorddns-delete<zone_id> <record_id>Delete DNS recorddns-export<zone_id>Export all records as JSONdns-import<zone_id> <file.json>Import records from JSONsettings-list<zone_id>List all zone settingssetting-get<zone_id> <setting>Get specific settingsetting-set<zone_id> <setting> <value>Update a settingssl-get<zone_id>Get current SSL modessl-set<zone_id> <mode>Set SSL mode (off/flexible/full/strict)cache-purge<zone_id> [url1 url2 ...]Purge specific URLs or everythingpagerules-list<zone_id>List page rulesfirewall-list<zone_id>List firewall rulestunnels-listList Cloudflare Tunnels (needs ACCOUNT_ID)tunnel-get<tunnel_id>Get tunnel detailstunnel-create<name>Create a tunnel (needs ACCOUNT_ID)tunnel-delete<tunnel_id>Delete a tunnel (needs ACCOUNT_ID)analytics<zone_id> [since_minutes]Zone analytics (default: last 24h)
true โ orange cloud, traffic through Cloudflare (CDN, WAF, DDoS) false โ grey cloud, DNS-only (use for MX, non-HTTP services)
1 = automatic (Cloudflare-managed) Set explicit seconds for DNS-only records (e.g., 3600)
# Find zone ID cf zones example.com # Create A record (proxied) cf dns-create <zone_id> A example.com 1.2.3.4 true # Create www CNAME cf dns-create <zone_id> CNAME www.example.com example.com true
cf dns-create <zone_id> MX example.com "mx.provider.com" false 1 cf dns-create <zone_id> TXT example.com "v=spf1 include:provider.com ~all" false
cf ssl-set <zone_id> strict
Always confirm with the user before: Deleting DNS records (dns-delete) Changing SSL mode Modifying firewall rules Any destructive operation Safe to do freely: Listing/reading zones, records, settings, analytics Verifying token
For DNS record types, SSL modes, and API details: see references/api-guide.md
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.