Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Read and edit Markdown notes on your personal computer via SSH tunnel. Use when the user asks to read, create, or append to notes in their vault.
Read and edit Markdown notes on your personal computer via SSH tunnel. Use when the user asks to read, create, or append to notes in their vault.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Access Markdown notes on your personal computer from this VPS-hosted bot via SSH tunnel. Terminology: "Local machine" = your personal computer (macOS or Linux) where your notes live. This skill runs on the VPS and connects to your machine via a reverse SSH tunnel.
This is an instruction-only skill. Before using it, the user must complete a one-time setup on their local machine: Install vaultctl on the local machine (see setup instructions) Configure SSH forced-command on the local machine's ~/.ssh/authorized_keys to restrict the VPS key to only run vaultctl (see Security Model below) Start a reverse SSH tunnel from the local machine to the VPS, exposing localhost:2222 Set the environment variable VAULT_SSH_USER to the local machine's username
This skill connects to the local machine over a pre-configured reverse SSH tunnel. Access is restricted by design: Forced-command restriction: The VPS SSH key is added to the local machine's ~/.ssh/authorized_keys with a forced-command wrapper, so the VPS can ONLY execute vaultctl β no interactive shell, no arbitrary commands (rm, curl, etc.) Vault sandboxing: vaultctl validates all file paths are inside VAULT_ROOT and rejects path traversal attempts (.., symlinks outside vault) Non-destructive: Only create (new files) and append (existing files) are supported β no delete, rename, move, or overwrite No credentials stored: SSH authentication uses the VPS's existing SSH keypair; no additional secrets are stored by this skill Example authorized_keys entry on the local machine: command="/usr/local/bin/vaultctl-wrapper",no-port-forwarding,no-X11-forwarding,no-agent-forwarding ssh-ed25519 AAAA... vps-key This ensures the VPS can only run vaultctl commands, even if the tunnel is compromised.
You have access to these commands ONLY. Do not attempt commands not listed here (no rename, delete, move, or edit commands exist). CommandDescriptiontreeList vault directory structureresolveFind note by path or titleinfoGet file metadata (lines, bytes, sha256, mtime)readRead note contentcreateCreate a NEW note (fails if file exists)appendAppend content to EXISTING note
All commands are executed via SSH: ssh -4 -p ${VAULT_SSH_PORT:-2222} ${VAULT_SSH_USER}@${VAULT_SSH_HOST:-localhost} vaultctl <command> [args] Always use -4 to force IPv4 (avoids IPv6 timeout issues).
These must be set in the skill's runtime environment on the VPS: VariableRequiredDefaultDescriptionVAULT_SSH_USERYesβLocal machine username for SSH tunnelVAULT_SSH_PORTNo2222SSH tunnel port on localhostVAULT_SSH_HOSTNolocalhostSSH tunnel host
ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl tree ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl tree --depth 2 ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl tree --all Options: --depth N - Maximum depth to traverse --all - Include all files, not just .md
ALWAYS use --base64 for path and title arguments to prevent shell injection: # echo -n "Projects/Plan.md" | base64 β UHJvamVjdHMvUGxhbi5tZA== ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl resolve --path UHJvamVjdHMvUGxhbi5tZA== --base64 # echo -n "Meeting Notes" | base64 β TWVldGluZyBOb3Rlcw== ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl resolve --title TWVldGluZyBOb3Rlcw== --base64
ALWAYS use --base64 for the path argument: # echo -n "Projects/Plan.md" | base64 β UHJvamVjdHMvUGxhbi5tZA== ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl info UHJvamVjdHMvUGxhbi5tZA== --base64 Returns JSON: {"path": "...", "lines": N, "bytes": N, "sha256": "...", "mtime": N}
ALWAYS use --base64 for the path argument: # echo -n "Projects/Plan.md" | base64 β UHJvamVjdHMvUGxhbi5tZA== ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl read UHJvamVjdHMvUGxhbi5tZA== --base64 Returns JSON: {"path": "...", "content": "..."}
IMPORTANT: Use --base64 flag with BOTH path AND content base64 encoded. This is required for paths/content with spaces or special characters. ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl create <base64_path> <base64_content> --base64 Example to create "Notes/Morning Brief.md" with content "# Hello\n\nWorld": # Encode path: echo -n "Notes/Morning Brief.md" | base64 β Tm90ZXMvTW9ybmluZyBCcmllZi5tZA== # Encode content: echo -n "# Hello\n\nWorld" | base64 β IyBIZWxsbwoKV29ybGQ= ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl create Tm90ZXMvTW9ybmluZyBCcmllZi5tZA== IyBIZWxsbwoKV29ybGQ= --base64 Creates parent directories automatically Fails if file already exists (use append to add to existing files) File must have .md extension NEVER duplicate the title as a heading inside the note content (e.g., for "My Note.md", don't start content with "# My Note")
ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl append <base64_path> <base64_content> --base64 Fails if file does not exist (use create for new files)
These operations are NOT supported: Rename files or folders Delete files or folders Move files between folders Edit specific parts of a file (only append to end) Create folders without a file (folders are created automatically with create)
Always run vaultctl tree first to see what notes exist Use vaultctl resolve --title <base64> --base64 to find a note by name All output is JSON The local machine must be online with tunnel running ALWAYS use --base64 for ALL path and content arguments β this is mandatory for security, not optional
Important: Always run tree first if you're unsure what notes exist. This prevents errors from wrong paths or duplicate names.
User: "Show me my project plan" Step 1 - Check what exists: ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl tree Output: {"tree": [{"path": "Projects", "type": "dir"}, {"path": "Projects/Plan.md", "type": "file"}]} Step 2 - Now read the correct path (always base64 encode): # echo -n "Projects/Plan.md" | base64 β UHJvamVjdHMvUGxhbi5tZA== ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl read UHJvamVjdHMvUGxhbi5tZA== --base64 Output: {"path": "Projects/Plan.md", "content": "# Project Plan\n\n## Goals\n..."}
User: "Create a meeting notes file" Step 1 - Check what already exists: ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl tree Output: {"tree": [{"path": "Projects", "type": "dir"}, {"path": "Projects/Plan.md", "type": "file"}]} Step 2 - No "Meeting Notes" exists, safe to create (do NOT duplicate title as heading): # echo -n "Meeting Notes.md" | base64 β TWVldGluZyBOb3Rlcy5tZA== # echo -n "## Agenda\n\n- Item 1\n- Item 2\n" | base64 β IyMgQWdlbmRhCgotIEl0ZW0gMQotIEl0ZW0gMgo= ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl create TWVldGluZyBOb3Rlcy5tZA== IyMgQWdlbmRhCgotIEl0ZW0gMQotIEl0ZW0gMgo= --base64 Output: {"status": "ok", "path": "Meeting Notes.md"}
User: "What's in my notes?" ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl tree --depth 2 Output: {"tree": [{"path": "Projects", "type": "dir"}, {"path": "Projects/Plan.md", "type": "file"}, {"path": "Ideas.md", "type": "file"}]} Then summarize for user: "You have a Projects folder with Plan.md, and an Ideas.md file at the root."
User: "According to the source note 'AI Digest Sources.md', browse the sources and output the digest to 'digest/2025-01-28-digest.md'" Step 1 - Check what exists: ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl tree Output: {"tree": [{"path": "AI Digest Sources.md", "type": "file"}, {"path": "digest", "type": "dir"}, {"path": "digest/2025-01-27-digest.md", "type": "file"}]} Step 2 - Validate: Source "AI Digest Sources.md" exists Output "digest/2025-01-28-digest.md" does NOT exist, will use create (If source didn't exist: STOP and ask user "I couldn't find 'AI Digest Sources.md'. Did you mean one of these: [list alternatives]?") (If output already existed: use append instead of create) Step 3 - Read the source note (always base64 encode): # echo -n "AI Digest Sources.md" | base64 β QUkgRGlnZXN0IFNvdXJjZXMubWQ= ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl read QUkgRGlnZXN0IFNvdXJjZXMubWQ= --base64 Output: {"path": "AI Digest Sources.md", "content": "# AI Digest Sources\n\n- https://example.com/article1\n- https://example.com/article2\n"} Step 4 - Browse sources and generate digest content (done by bot outside this skill) Step 5 - Write output to vault (do NOT duplicate title as heading): # echo -n "digest/2025-01-28-digest.md" | base64 β ZGlnZXN0LzIwMjUtMDEtMjgtZGlnZXN0Lm1k # echo -n "## Summary\n\nKey points from today's sources...\n" | base64 β IyMgU3VtbWFyeQoKS2V5IHBvaW50cyBmcm9tIHRvZGF5J3Mgc291cmNlcy4uLgo= ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl create ZGlnZXN0LzIwMjUtMDEtMjgtZGlnZXN0Lm1k IyMgU3VtbWFyeQoKS2V5IHBvaW50cyBmcm9tIHRvZGF5J3Mgc291cmNlcy4uLgo= --base64 (If output already existed, use append instead:) ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl append ZGlnZXN0LzIwMjUtMDEtMjgtZGlnZXN0Lm1k IyMgVXBkYXRlCi4uLg== --base64
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.