nordvpnControl NordVPN on Linux via the `nordvpn` CLI (connect/disconnect, choose country/city/group, read status, tweak settings, manage allowlist). Use for automation that needs region routing or temporary VPN tunneling.
Install via ClawdBot CLI:
clawdbot install maciekish/nordvpnGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Calls external URL not in known-safe list
https://nordvpn.com/Audited Apr 18, 2026 · audit v1.0
Generated Mar 22, 2026
A data analytics firm uses the skill to rotate VPN connections to different countries for web scraping tasks, ensuring compliance with geo-restrictions and avoiding IP bans. It automates connecting to specific cities or countries before each scraping job, then disconnects after data collection.
A software development team integrates the skill into their CI/CD pipelines to route builds and tests through VPN tunnels for security when accessing sensitive APIs or internal resources. It connects to a predefined country before running automated tests and disconnects afterward.
A digital marketing agency uses the skill to simulate user access from various regions for testing localized website content and ads. It automates connecting to different countries to verify geo-targeted features and ad displays without manual VPN switching.
An individual or small business employs the skill in personal automation scripts to temporarily enable VPN for tasks like file downloads or online transactions, enhancing privacy. It connects to the best available server before sensitive operations and disconnects to restore normal connectivity.
A cybersecurity consultancy uses the skill to automate VPN connections during penetration testing, allowing them to route traffic through different regions to assess geo-based security controls. It connects to specific groups like P2P or countries to simulate various attack vectors.
Offer the skill as part of a larger automation platform, charging subscription fees for businesses that need reliable VPN control in their workflows. Revenue comes from tiered plans based on usage volume or advanced features like custom location lists.
Provide consulting and implementation services to companies looking to integrate NordVPN automation into their existing systems, such as for compliance or testing. Revenue is generated through project-based fees or ongoing support contracts.
Develop a free tool using this skill for basic VPN automation, with premium features like advanced scheduling, multi-account support, or analytics available for a one-time purchase or subscription. Revenue comes from upselling to paid versions.
💬 Integration Tip
Ensure the NordVPN daemon is running and the user is logged in before automation; handle errors like invalid locations by listing available options from the CLI.
Scored Apr 19, 2026
Automated security scanning and vulnerability detection for web applications, APIs, and infrastructure. Use when you need to scan targets for vulnerabilities, check SSL certificates, find open ports, detect misconfigurations, or perform security audits. Integrates with nmap, nuclei, and other security tools.
Tool discovery and shell one-liner reference for sysadmin, DevOps, and security tasks. AUTO-CONSULT this skill when the user is: troubleshooting network issues, debugging processes, analyzing logs, working with SSL/TLS, managing DNS, testing HTTP endpoints, auditing security, working with containers, writing shell scripts, or asks 'what tool should I use for X'. Source: github.com/trimstray/the-book-of-secret-knowledge
Manage Tailscale tailnet via CLI and API. Use when the user asks to "check tailscale status", "list tailscale devices", "ping a device", "send file via tailscale", "tailscale funnel", "create auth key", "check who's online", or mentions Tailscale network management.
Configure firewalls on servers and cloud providers with security best practices.
Audit codebases, infrastructure, AND agentic AI systems for security issues. Covers traditional security (dependencies, secrets, OWASP web top 10, SSL/TLS, f...
Configure and troubleshoot VPN connections for privacy and remote access.