linuxOperate Linux systems avoiding permission traps, silent failures, and common admin mistakes.
Install via ClawdBot CLI:
clawdbot install ivangdavila/linuxGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Potentially destructive shell commands in tool definitions
rm -rf /Accesses system directories or attempts privilege escalation
/etc/hostsAudited Apr 17, 2026 · audit v1.0
Generated Mar 1, 2026
A developer accidentally runs chmod 777 on critical system directories while troubleshooting, breaking SSH access and causing production downtime. The admin needs to identify the actual permission issue rather than blanket permission changes, using proper ownership and ACL checks to restore secure access without compromising system integrity.
A database server shows disk full errors despite df indicating available space, caused by deleted log files still held open by the database process. The DBA must use lsof to identify open deleted files and safely restart processes to reclaim space, while implementing proper log rotation to prevent recurrence.
Docker containers in a microservices architecture are being killed by the OOM killer despite the host having available memory, due to cgroup limits being exceeded. DevOps engineers need to monitor actual memory usage with VmRSS metrics and adjust container limits while preventing swap thrashing that degrades performance.
Cron jobs for critical backups fail silently because they use relative paths not in cron's minimal PATH, and output goes to unmonitored mail. The sysadmin must rewrite cron jobs with absolute paths, redirect output to monitored log files, and implement proper error handling to ensure backup reliability.
Team members cannot SSH into development servers after a system update because ~/.ssh directory permissions are incorrect, causing silent authentication failures. The IT team must enforce proper permission standards (700 for directories, 600 for keys) and implement SSH config management to maintain secure access across the organization.
Provide expert troubleshooting services for companies experiencing Linux system failures, focusing on permission issues, disk space mysteries, and process management problems. Offer retainer-based support with guaranteed response times for critical production incidents, helping clients avoid costly downtime.
Develop and sell specialized training programs that teach Linux system administration best practices, focusing on avoiding common pitfalls documented in the skill. Offer certification exams and hands-on labs that simulate real-world scenarios like disk space crises and permission lockouts.
Offer a SaaS platform that monitors Linux systems for the specific gotchas mentioned, such as permission changes, disk space anomalies, and process issues. Provide automated alerts and remediation scripts, with tiered pricing based on server count and monitoring depth.
💬 Integration Tip
Integrate this skill with monitoring tools like Prometheus for disk space alerts and implement automated permission audits in CI/CD pipelines to catch issues before deployment.
Scored Apr 18, 2026
Full desktop computer use for headless Linux servers. Xvfb + XFCE virtual desktop with xdotool automation. 17 actions (click, type, scroll, screenshot, drag,...
Kubernetes & OpenShift Platform Agent Swarm — A coordinated multi-agent system for cluster operations. Includes Orchestrator (Jarvis), Cluster Ops (Atlas), G...
Essential SSH commands for secure remote access, key management, tunneling, and file transfers.
Fetch GitHub issues, spawn sub-agents to implement fixes and open PRs, then monitor and address PR review comments. Usage: /gh-issues [owner/repo] [--label b...
Diagnoses common Linux service issues using logs, systemd/PM2, file permissions, Nginx reverse proxy checks, and DNS sanity checks. Use when a server app is failing, unreachable, or misconfigured.
Run a single command on a remote Tailscale node via SSH without opening an interactive session.