CtrlK
BlogDocsLog inGet started
Tessl Logo

harden

VPS security auditing and hardening

Install with Tessl CLI

npx tessl i github:alsk1992/CloddsBot --skill harden
What are skills?

Overall
score

61%

Does it follow best practices?

Validation for skill structure

SKILL.md
Review
Evals

VPS Hardening

Security auditing and automated hardening for remote servers.

Commands

/harden audit <host>

Run security audit against a server. Checks:

  • System updates
  • Auto-updates configuration
  • SSH root login status
  • Password authentication
  • Firewall status
  • Fail2ban status
  • System uptime
  • Listening services
  • Sudo user configuration

/harden fix <host>

Apply safe fixes that won't lock you out:

  • Install system updates
  • Enable unattended-upgrades
  • Configure UFW firewall
  • Install and enable fail2ban
  • Set SSH MaxAuthTries

/harden emergency <host>

Quick 10-minute hardening for new servers:

  • Full system update
  • Firewall setup
  • Fail2ban installation
  • Root password lock

/harden report <host>

Generate markdown security report.

Options

OptionDescription
--user=NAMESSH user (default: root)
--dry-runPreview changes without applying

Examples

/harden audit 192.168.1.100
/harden fix myserver.com --user=admin
/harden emergency vps.example.com --dry-run
/harden report server.io > security-report.md

Security Checks

CheckPass Criteria
System Updates0 pending updates
Auto Updatesunattended-upgrades installed
Root LoginPermitRootLogin no
Password AuthPasswordAuthentication no
FirewallUFW active or iptables configured
Fail2banService running
Uptime< 90 days
Services< 10 listening ports
Sudo UsersAt least one non-root sudo user
MaxAuthTriesSet to 3 or less
Repository
github.com/alsk1992/CloddsBot
Last updated
Created

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.