#10703: Add Tailscale VPN hardening guide to healthcheck skill
Cluster:
Security Enhancements and Fixes
Adds section 4b to the healthcheck skill with step-by-step guidance for securing VPS SSH access via Tailscale.
**What's included:**
- When to recommend Tailscale (VPS, remote access, "VPS Hardened" profile)
- Installation and authentication steps
- UFW rules to restrict SSH to tailnet only
- Critical verification checklist before closing session
- Rollback plan if locked out
- Alternative options (WireGuard, fail2ban, Cloudflare Tunnel)
**Why:**
Many OpenClaw users run on remote VPS instances with SSH exposed to the internet. This gives the agent clear, safe instructions to help users hide SSH behind a private tailnet — reducing attack surface without complex VPN setup.
Tested on Ubuntu 24.04 VPS (Hostinger).
<!-- greptile_comment -->
<h2>Greptile Overview</h2>
<h3>Greptile Summary</h3>
- Updates the `healthcheck` skill documentation to add a new optional “4b) Tailscale hardening” section for VPS/remote-access scenarios.
- Provides step-by-step guidance for installing Tailscale, obtaining a tailnet IP, and restricting SSH access to the Tailscale CGNAT range via UFW.
- Adds a verification checklist, rollback guidance, and alternative remote-access approaches (WireGuard, fail2ban, Cloudflare Tunnel).
<h3>Confidence Score: 3/5</h3>
- This PR is mostly safe to merge, but the new hardening instructions include steps that can cause immediate outages or add avoidable supply-chain risk if followed verbatim.
- Only documentation changes, but the doc is operational guidance for security hardening; enabling UFW without preserving required ports can break running services, and `curl | sh` is an unsafe installation pattern for a hardening guide.
- skills/healthcheck/SKILL.md
<!-- greptile_other_comments_section -->
<sub>(2/5) Greptile learns from your feedback when you react with thumbs up/down!</sub>
<!-- /greptile_comment -->
Most Similar PRs
#10514: Security: harden AGENTS.md with gateway, prompt injection, and supp...
by catpilothq · 2026-02-06
70.7%
#15757: feat(security): add hardening gap audit checks
by saurabhsh5 · 2026-02-13
70.6%
#7346: Security: add hardening module and secure-bot extension
by AlphonseC · 2026-02-02
70.5%
#14538: docs: recommend Tailscale Serve for HTTPS access (#14513)
by lailoo · 2026-02-12
70.0%
#16251: docs: remove note about personal single-user access from trusted pr...
by nickytonline · 2026-02-14
70.0%
#8873: fix: document skill loading locations in system prompt
by ytfh44 · 2026-02-04
69.8%
#20698: docs: add production VPS deployment guide
by aiagentswiz · 2026-02-19
69.6%
#7892: Claude/setup agent firewall ww xsv
by starwreckntx · 2026-02-03
68.9%
#8075: fix(skills): add --ignore-scripts to all package managers
by yubrew · 2026-02-03
68.9%
#21964: Security: harden gateway and plugin trust boundaries
by Elormyevu · 2026-02-20
68.7%