ZappushZappush
SkillsUse CasesBenchmarkCommunitySign In
      Back to Skills
      bjesuiter

      Safety Report

      exe-dev

      @bjesuiter

      Manage persistent VMs on exe.dev. Create VMs, configure HTTP proxies, share access, and set up custom domains. Use when working with exe.dev VMs for hosting, development, or running persistent services.

      1,737Downloads
      0Installs
      0Stars
      1Versions
      Networking & DNS1,102

      Security Analysis

      high confidence
      Clean0.04 risk

      The skill is an instruction-only wrapper of exe.dev documentation and its requested resources/steps are consistent with managing exe.dev VMs — nothing in the package tries to access unrelated credentials or install arbitrary code.

      Feb 11, 20262 files1 concern
      Purpose & Capabilityok

      The name and description (managing exe.dev VMs) match the SKILL.md content: SSH commands, proxy rules, sharing, and custom domain instructions. The skill requests no binaries, env vars, or config paths beyond what the docs describe, which is proportionate for a documentation-only helper.

      Instruction Scopenote

      SKILL.md is documentation-only and does not instruct the agent to read local secrets or system files. It does include a mitmproxy example showing how to inject headers for testing and notes that the Shelley agent reads ~/.config/shelley/AGENTS.md; these are documentation items (not code) but they are sensitive in that they describe mechanisms that can be used to spoof headers or access agent config files. The skill itself does not automate or advise reading host files or exfiltrating data, but users should be cautious when following the mitmproxy example or when exposing services that trust forwarded headers.

      Install Mechanismok

      No install spec and no code files — lowest-risk delivery. Nothing is downloaded or written to disk by the skill bundle itself.

      Credentialsok

      No environment variables, credentials, or config paths are requested. The documentation describes exe.dev adding authentication headers (X-ExeDev-UserID, X-ExeDev-Email) to proxied requests — this is a service behavior to be aware of but is appropriate context for a VM-management doc.

      Persistence & Privilegeok

      Skill is not always-enabled, contains no installation or persistent agent modifications, and does not request elevated/ongoing system privileges. Autonomous invocation is allowed (platform default) but the skill has no code to run autonomously.

      Guidance

      This is essentially an auto-built copy of exe.dev documentation — the package itself contains only docs and no code, installs, or credential requests. Before using: verify you're actually interacting with the real exe.dev service (check the SSH host key fingerprint against official sources), don't run unfamiliar SSH commands as root, and be careful with the mitmproxy example (it demonstrates header injection and can be used to spoof authentication for testing; avoid using it on production traffic). Also treat any VM marked 'public' or shared-links as potentially accessible to others, and verify pricing/billing details on the official site. If you need higher assurance, ask the publisher for the origin/homepage or test these commands in an isolated account/VM first.

      Latest Release

      v1.0.0

      Initial release with VM management, HTTP proxies, sharing, custom domains, and Shelley agent support

      More by @bjesuiter

      Opencode Acp Control

      8 stars

      Prd

      7 stars

      Mole Mac Cleanup

      1 stars

      Nb

      0 stars

      Bridle

      0 stars

      self-improving-agent

      @pskoett · 1,456 stars

      Published by @bjesuiter on ClawHub

      Zappush© 2026 Zappush
      HomeGuaranteeSupport

      Something feels unusual? We want to help: [email protected]