linuxOperate Linux systems avoiding permission traps, silent failures, and common admin mistakes.
Install via ClawdBot CLI:
clawdbot install ivangdavila/linuxchmod 777 fixes nothing, breaks everything — find the actual owner/group issuechown -R follows symlinks outside target directory — use --no-dereferencegetfaclkill sends SIGTERM by default, not SIGKILL — process can ignore itnohup doesn't work if process already running — use disown instead& still dies on terminal close without disown or nohupkill -9 skips cleanup handlers — data loss possible, use SIGTERM firstlsof +L1rm -rf /path / with accidental space = disaster — use rm -rf /path/ trailing slashfind -L follows them/tmp cleared on reboot — don't store persistent data therelsof +L1 shows them, restart process to freetune2fs -m 1 to reducejournalctl --vacuum-size=500Mdocker system prune -alocalhost and 127.0.0.1 may resolve differently — check /etc/hostsiptables-save or use firewalld/ufw persistencenetstat deprecated — use ss insteadsetcap for capability insteadnet.ipv4.tcp_tw_reusessh-keygen -RServerAliveInterval 60 to configsystemctl enable doesn't start service — also need startrestart vs reload: restart drops connections, reload doesn't (if supported)Storage=persistent in journald.confRestart=on-failure to unitAfter=network.target isn't enough — use network-online.target/dev/nullcrontab -l > backup before editingvmstatfree includes cache — "available" is what matters/proc/[pid]/status — VmRSS is actual usagedf shows filesystem capacity, not physical disk — check underlying devicedu doesn't count sparse files correctly — file appears smaller than disk usageps aux memory percentage can exceed 100% (shared memory counted multiple times)uptime load average includes uninterruptible I/O wait — not just CPUtop CPU percentage is per-core — 400% means 4 cores maxedGenerated Mar 1, 2026
A developer accidentally runs chmod 777 on critical system directories while troubleshooting, breaking SSH access and causing production downtime. The admin needs to identify the actual permission issue rather than blanket permission changes, using proper ownership and ACL checks to restore secure access without compromising system integrity.
A database server shows disk full errors despite df indicating available space, caused by deleted log files still held open by the database process. The DBA must use lsof to identify open deleted files and safely restart processes to reclaim space, while implementing proper log rotation to prevent recurrence.
Docker containers in a microservices architecture are being killed by the OOM killer despite the host having available memory, due to cgroup limits being exceeded. DevOps engineers need to monitor actual memory usage with VmRSS metrics and adjust container limits while preventing swap thrashing that degrades performance.
Cron jobs for critical backups fail silently because they use relative paths not in cron's minimal PATH, and output goes to unmonitored mail. The sysadmin must rewrite cron jobs with absolute paths, redirect output to monitored log files, and implement proper error handling to ensure backup reliability.
Team members cannot SSH into development servers after a system update because ~/.ssh directory permissions are incorrect, causing silent authentication failures. The IT team must enforce proper permission standards (700 for directories, 600 for keys) and implement SSH config management to maintain secure access across the organization.
Provide expert troubleshooting services for companies experiencing Linux system failures, focusing on permission issues, disk space mysteries, and process management problems. Offer retainer-based support with guaranteed response times for critical production incidents, helping clients avoid costly downtime.
Develop and sell specialized training programs that teach Linux system administration best practices, focusing on avoiding common pitfalls documented in the skill. Offer certification exams and hands-on labs that simulate real-world scenarios like disk space crises and permission lockouts.
Offer a SaaS platform that monitors Linux systems for the specific gotchas mentioned, such as permission changes, disk space anomalies, and process issues. Provide automated alerts and remediation scripts, with tiered pricing based on server count and monitoring depth.
💬 Integration Tip
Integrate this skill with monitoring tools like Prometheus for disk space alerts and implement automated permission audits in CI/CD pipelines to catch issues before deployment.
Automatically update Clawdbot and all installed skills once daily. Runs via cron, checks for updates, applies them, and messages the user with a summary of what changed.
Full desktop computer use for headless Linux servers. Xvfb + XFCE virtual desktop with xdotool automation. 17 actions (click, type, scroll, screenshot, drag,...
Essential Docker commands and workflows for container management, image operations, and debugging.
Tool discovery and shell one-liner reference for sysadmin, DevOps, and security tasks. AUTO-CONSULT this skill when the user is: troubleshooting network issues, debugging processes, analyzing logs, working with SSL/TLS, managing DNS, testing HTTP endpoints, auditing security, working with containers, writing shell scripts, or asks 'what tool should I use for X'. Source: github.com/trimstray/the-book-of-secret-knowledge
Deploy applications and manage projects with complete CLI reference. Commands for deployments, projects, domains, environment variables, and live documentation access.
Monitor topics of interest and proactively alert when important developments occur. Use when user wants automated monitoring of specific subjects (e.g., product releases, price changes, news topics, technology updates). Supports scheduled web searches, AI-powered importance scoring, smart alerts vs weekly digests, and memory-aware contextual summaries.