sparkle-vpnControl Sparkle VPN - start, stop, manage system proxy, query status and switch nodes using Mihomo core directly.
Install via ClawdBot CLI:
clawdbot install cwyhkyochen-a11y/sparkle-vpnThis skill provides tools to control the Sparkle VPN using Mihomo core directly (no GUI interaction needed).
sparkle_vpn_start - Start VPN using Mihomo core with DirectACCESS profilesparkle_vpn_stop - Stop VPN and kill all related processesUses Mihomo core directly:
~/.config/sparkle/profiles/19c48c94cbb.yaml7890 (HTTP/HTTPS)~/.config/sparkle/Start VPN:
bash /home/admin/.openclaw/workspace/skills/sparkle-vpn/scripts/start-vpn.sh
Stop VPN:
bash /home/admin/.openclaw/workspace/skills/sparkle-vpn/scripts/stop-vpn.sh
Generated Feb 26, 2026
Enables secure VPN connections for employees working remotely, ensuring encrypted access to corporate networks and resources. This skill automates VPN management without requiring manual GUI interaction, ideal for IT teams managing distributed teams.
Facilitates quick VPN configuration for developers needing secure access to cloud-based development environments or testing servers. It streamlines the process by using direct Mihomo core commands, reducing setup time and errors.
Helps organizations comply with data protection regulations by automating VPN usage for secure data transmission. This ensures sensitive information is encrypted during transfers, suitable for industries like finance or healthcare.
Supports secure remote management of IoT devices by establishing VPN tunnels for monitoring and control. This skill allows automated start/stop operations, enhancing security in smart infrastructure or industrial IoT applications.
Enables users to bypass geographic restrictions by starting VPN connections for accessing region-locked content or services. It provides a straightforward command-line interface for personal or small business use.
Offers premium VPN access with automated management features, targeting businesses and individuals seeking enhanced security. Revenue is generated through monthly or annual subscriptions, with tiered pricing based on usage limits.
Integrates this skill into broader security packages for corporations, providing automated VPN control as part of managed IT services. Revenue comes from licensing fees, support contracts, and customization for large-scale deployments.
Provides a free version for basic VPN control, with advanced features like multi-profile support or analytics available in paid tiers. Revenue is generated through upgrades, targeting developers and tech-savvy users.
💬 Integration Tip
Ensure the Mihomo core and required scripts are properly installed and configured in the specified directories to avoid permission or path errors.
Set up and use 1Password CLI (op). Use when installing the CLI, enabling desktop app integration, signing in (single or multi-account), or reading/injecting/running secrets via op.
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope, and suspicious patterns.
Perform a comprehensive read-only security audit of Clawdbot's own configuration. This is a knowledge-based skill that teaches Clawdbot to identify hardening opportunities across the system. Use when user asks to "run security check", "audit clawdbot", "check security hardening", or "what vulnerabilities does my Clawdbot have". This skill uses Clawdbot's internal capabilities and file system access to inspect configuration, detect misconfigurations, and recommend remediations. It is designed to be extensible - new checks can be added by updating this skill's knowledge.
Use when reviewing code for security vulnerabilities, implementing authentication flows, auditing OWASP Top 10, configuring CORS/CSP headers, handling secrets, input validation, SQL injection prevention, XSS protection, or any security-related code review.
Security check for ClawHub skills powered by Koi. Query the Clawdex API before installing any skill to verify it's safe.
Scan Clawdbot and MCP skills for malware, spyware, crypto-miners, and malicious code patterns before you install them. Security audit tool that detects data exfiltration, system modification attempts, backdoors, and obfuscation techniques.