{
  "schemaVersion": "1.0",
  "item": {
    "slug": "network",
    "name": "Network",
    "source": "tencent",
    "type": "skill",
    "category": "通讯协作",
    "sourceUrl": "https://clawhub.ai/ivangdavila/network",
    "canonicalUrl": "https://clawhub.ai/ivangdavila/network",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadMode": "redirect",
    "downloadUrl": "/downloads/network",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=network",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "installMethod": "Manual import",
    "extraction": "Extract archive",
    "prerequisites": [
      "OpenClaw"
    ],
    "packageFormat": "ZIP package",
    "includedAssets": [
      "SKILL.md"
    ],
    "primaryDoc": "SKILL.md",
    "quickSetup": [
      "Download the package from Yavira.",
      "Extract the archive and review SKILL.md first.",
      "Import or place the package into your OpenClaw setup."
    ],
    "agentAssist": {
      "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
      "steps": [
        "Download the package from Yavira.",
        "Extract it into a folder your agent can access.",
        "Paste one of the prompts below and point your agent at the extracted folder."
      ],
      "prompts": [
        {
          "label": "New install",
          "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
        },
        {
          "label": "Upgrade existing",
          "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
        }
      ]
    },
    "sourceHealth": {
      "source": "tencent",
      "slug": "network",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-30T18:17:52.104Z",
      "expiresAt": "2026-05-07T18:17:52.104Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=network",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=network",
        "contentDisposition": "attachment; filename=\"network-1.0.0.zip\"",
        "redirectLocation": null,
        "bodySnippet": null,
        "slug": "network"
      },
      "scope": "item",
      "summary": "Item download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this item.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/network"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    },
    "downloadPageUrl": "https://openagent3.xyz/downloads/network",
    "agentPageUrl": "https://openagent3.xyz/skills/network/agent",
    "manifestUrl": "https://openagent3.xyz/skills/network/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/network/agent.md"
  },
  "agentAssist": {
    "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
    "steps": [
      "Download the package from Yavira.",
      "Extract it into a folder your agent can access.",
      "Paste one of the prompts below and point your agent at the extracted folder."
    ],
    "prompts": [
      {
        "label": "New install",
        "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
      },
      {
        "label": "Upgrade existing",
        "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
      }
    ]
  },
  "documentation": {
    "source": "clawhub",
    "primaryDoc": "SKILL.md",
    "sections": [
      {
        "title": "TCP/IP Basics",
        "body": "TCP guarantees delivery with retransmission — use for reliability (HTTP, SSH, databases)\nUDP is fire-and-forget — use for speed when loss is acceptable (video, gaming, DNS queries)\nPort numbers: 0-1023 privileged (need root), 1024-65535 available — common services have well-known ports\nEphemeral ports for client connections — OS assigns randomly from high range"
      },
      {
        "title": "DNS",
        "body": "DNS resolution is cached at multiple levels — browser, OS, router, ISP — flush all when debugging\nTTL determines cache duration — lower before migrations, raise after for performance\nA record for IPv4, AAAA for IPv6, CNAME for aliases, MX for mail\nCNAME cannot exist at zone apex (root domain) — use A record or provider-specific alias\ndig and nslookup query DNS directly — bypass local cache for accurate results"
      },
      {
        "title": "IP Addressing",
        "body": "Private ranges: 10.x.x.x, 172.16-31.x.x, 192.168.x.x — not routable on internet\nCIDR notation: /24 = 256 IPs, /16 = 65536 IPs — each bit halves or doubles the range\n127.0.0.1 is localhost — 0.0.0.0 means all interfaces, not a valid destination\nNAT translates private to public IPs — most home/office networks use this\nIPv6 eliminates NAT need — but dual-stack with IPv4 still common"
      },
      {
        "title": "Common Ports",
        "body": "22: SSH — 80: HTTP — 443: HTTPS — 53: DNS\n25/465/587: SMTP (mail sending) — 143/993: IMAP — 110/995: POP3\n3306: MySQL — 5432: PostgreSQL — 6379: Redis — 27017: MongoDB\n3000/8080/8000: Common development servers"
      },
      {
        "title": "Troubleshooting Tools",
        "body": "ping tests reachability — but ICMP may be blocked, no response doesn't mean down\ntraceroute/tracert shows path — identifies where packets stop or slow down\nnetstat -tulpn or ss -tulpn shows listening ports — find what's using a port\ncurl -v shows full HTTP transaction — headers, timing, TLS negotiation\ntcpdump and Wireshark capture packets — last resort for deep debugging"
      },
      {
        "title": "Firewalls and NAT",
        "body": "Stateful firewalls track connections — allow response to outbound requests automatically\nPort forwarding maps external port to internal IP:port — required to expose services behind NAT\nHairpin NAT for internal access to external IP — not all routers support it\nUPnP auto-configures port forwarding — convenient but security risk, disable on servers"
      },
      {
        "title": "Load Balancing",
        "body": "Round-robin distributes sequentially — simple but ignores server capacity\nLeast connections sends to least busy — better for varying request durations\nHealth checks remove dead servers — configure appropriate intervals and thresholds\nSticky sessions (affinity) keep user on same server — needed for stateful apps, breaks scaling"
      },
      {
        "title": "VPNs and Tunnels",
        "body": "VPN encrypts traffic to exit point — all traffic appears from VPN server IP\nSplit tunneling sends only some traffic through VPN — reduces latency for local resources\nWireGuard is modern and fast — simpler than OpenVPN, better performance\nSSH tunnels for ad-hoc port forwarding — ssh -L local:remote:port creates secure tunnel"
      },
      {
        "title": "SSL/TLS",
        "body": "TLS 1.2 minimum, prefer 1.3 — older versions have known vulnerabilities\nCertificate chain: leaf → intermediate → root — missing intermediate causes validation failures\nSNI allows multiple certs on one IP — older clients without SNI get default cert\nLet's Encrypt certs expire in 90 days — automate renewal or face outages"
      },
      {
        "title": "Common Mistakes",
        "body": "Assuming DNS changes are instant — TTL means old records persist in caches\nBlocking ICMP entirely — breaks path MTU discovery, causes mysterious failures\nForgetting IPv6 — services may be accessible on IPv6 even with IPv4 firewall\nHardcoding IPs instead of hostnames — breaks when IPs change\nNot checking both TCP and UDP — some services need UDP (DNS, VPN, game servers)\nConfusing latency and bandwidth — high bandwidth doesn't mean low latency"
      }
    ],
    "body": "Network Fundamentals\nTCP/IP Basics\nTCP guarantees delivery with retransmission — use for reliability (HTTP, SSH, databases)\nUDP is fire-and-forget — use for speed when loss is acceptable (video, gaming, DNS queries)\nPort numbers: 0-1023 privileged (need root), 1024-65535 available — common services have well-known ports\nEphemeral ports for client connections — OS assigns randomly from high range\nDNS\nDNS resolution is cached at multiple levels — browser, OS, router, ISP — flush all when debugging\nTTL determines cache duration — lower before migrations, raise after for performance\nA record for IPv4, AAAA for IPv6, CNAME for aliases, MX for mail\nCNAME cannot exist at zone apex (root domain) — use A record or provider-specific alias\ndig and nslookup query DNS directly — bypass local cache for accurate results\nIP Addressing\nPrivate ranges: 10.x.x.x, 172.16-31.x.x, 192.168.x.x — not routable on internet\nCIDR notation: /24 = 256 IPs, /16 = 65536 IPs — each bit halves or doubles the range\n127.0.0.1 is localhost — 0.0.0.0 means all interfaces, not a valid destination\nNAT translates private to public IPs — most home/office networks use this\nIPv6 eliminates NAT need — but dual-stack with IPv4 still common\nCommon Ports\n22: SSH — 80: HTTP — 443: HTTPS — 53: DNS\n25/465/587: SMTP (mail sending) — 143/993: IMAP — 110/995: POP3\n3306: MySQL — 5432: PostgreSQL — 6379: Redis — 27017: MongoDB\n3000/8080/8000: Common development servers\nTroubleshooting Tools\nping tests reachability — but ICMP may be blocked, no response doesn't mean down\ntraceroute/tracert shows path — identifies where packets stop or slow down\nnetstat -tulpn or ss -tulpn shows listening ports — find what's using a port\ncurl -v shows full HTTP transaction — headers, timing, TLS negotiation\ntcpdump and Wireshark capture packets — last resort for deep debugging\nFirewalls and NAT\nStateful firewalls track connections — allow response to outbound requests automatically\nPort forwarding maps external port to internal IP:port — required to expose services behind NAT\nHairpin NAT for internal access to external IP — not all routers support it\nUPnP auto-configures port forwarding — convenient but security risk, disable on servers\nLoad Balancing\nRound-robin distributes sequentially — simple but ignores server capacity\nLeast connections sends to least busy — better for varying request durations\nHealth checks remove dead servers — configure appropriate intervals and thresholds\nSticky sessions (affinity) keep user on same server — needed for stateful apps, breaks scaling\nVPNs and Tunnels\nVPN encrypts traffic to exit point — all traffic appears from VPN server IP\nSplit tunneling sends only some traffic through VPN — reduces latency for local resources\nWireGuard is modern and fast — simpler than OpenVPN, better performance\nSSH tunnels for ad-hoc port forwarding — ssh -L local:remote:port creates secure tunnel\nSSL/TLS\nTLS 1.2 minimum, prefer 1.3 — older versions have known vulnerabilities\nCertificate chain: leaf → intermediate → root — missing intermediate causes validation failures\nSNI allows multiple certs on one IP — older clients without SNI get default cert\nLet's Encrypt certs expire in 90 days — automate renewal or face outages\nCommon Mistakes\nAssuming DNS changes are instant — TTL means old records persist in caches\nBlocking ICMP entirely — breaks path MTU discovery, causes mysterious failures\nForgetting IPv6 — services may be accessible on IPv6 even with IPv4 firewall\nHardcoding IPs instead of hostnames — breaks when IPs change\nNot checking both TCP and UDP — some services need UDP (DNS, VPN, game servers)\nConfusing latency and bandwidth — high bandwidth doesn't mean low latency"
  },
  "trust": {
    "sourceLabel": "tencent",
    "provenanceUrl": "https://clawhub.ai/ivangdavila/network",
    "publisherUrl": "https://clawhub.ai/ivangdavila/network",
    "owner": "ivangdavila",
    "version": "1.0.0",
    "license": null,
    "verificationStatus": "Indexed source record"
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/network",
    "downloadUrl": "https://openagent3.xyz/downloads/network",
    "agentUrl": "https://openagent3.xyz/skills/network/agent",
    "manifestUrl": "https://openagent3.xyz/skills/network/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/network/agent.md"
  }
}