home / skills / plurigrid / asi / tailscale

tailscale skill

/skills/tailscale

This skill helps you manage and troubleshoot tailscale mesh VPN deployments, including connection, SSH access, file transfer, DNS status, and exit nodes.

npx playbooks add skill plurigrid/asi --skill tailscale

Review the files below or copy the command above to add this skill to your agents.

Files (1)
SKILL.md
1.7 KB
---
name: tailscale
description: Mesh VPN.
version: 1.0.0
---


# tailscale

Mesh VPN.

## Connect

```bash
tailscale up
tailscale down
tailscale status
```

## SSH

```bash
tailscale ssh hostname
tailscale ssh user@hostname
```

## Serve

```bash
tailscale serve http://localhost:8080
tailscale serve https://localhost:443
tailscale serve status
tailscale serve reset
```

## Funnel

```bash
tailscale funnel 443
tailscale funnel status
tailscale funnel reset
```

## File

```bash
tailscale file cp file.txt hostname:
tailscale file get ~/Downloads/
```

## DNS

```bash
tailscale dns status
tailscale whois 100.x.y.z
```

## Exit

```bash
tailscale set --exit-node=hostname
tailscale set --exit-node=
```



## Scientific Skill Interleaving

This skill connects to the K-Dense-AI/claude-scientific-skills ecosystem:

### Graph Theory
- **networkx** [○] via bicomodule
  - Universal graph hub

### Bibliography References

- `distributed-systems`: 3 citations in bib.duckdb



## SDF Interleaving

This skill connects to **Software Design for Flexibility** (Hanson & Sussman, 2021):

### Primary Chapter: 8. Degeneracy

**Concepts**: redundancy, fallback, multiple strategies, robustness

### GF(3) Balanced Triad

```
tailscale (○) + SDF.Ch8 (−) + [balancer] (+) = 0
```

**Skill Trit**: 0 (ERGODIC - coordination)


### Connection Pattern

Degeneracy provides fallbacks. This skill offers redundant strategies.
## Cat# Integration

This skill maps to **Cat# = Comod(P)** as a bicomodule in the equipment structure:

```
Trit: 0 (ERGODIC)
Home: Prof
Poly Op: ⊗
Kan Role: Adj
Color: #26D826
```

### GF(3) Naturality

The skill participates in triads satisfying:
```
(-1) + (0) + (+1) ≡ 0 (mod 3)
```

This ensures compositional coherence in the Cat# equipment structure.

Overview

This skill provides a compact interface to Tailscale, a mesh VPN that makes devices discoverable and reachable across networks. It exposes commands for connecting devices, remote SSH, serving local services, secure file transfer, DNS inspection, and setting exit nodes. The skill is designed to support resilient workflows with multiple fallbacks and compositional integrations for scientific and design tooling.

How this skill works

The skill issues common Tailscale CLI operations to bring devices up or down, list status, and manage connections. It supports remote SSH via Tailscale-hostnames, exposes local services securely with serve/funnel, copies or retrieves files across the mesh, and inspects DNS and peer info. It also integrates conceptual hooks for redundancy and graph-aware tooling so it fits into workflows that require robustness and topological reasoning.

When to use it

  • Connect machines across NATs and firewalls without manual port forwarding.
  • SSH into remote devices using stable Tailscale hostnames instead of IP management.
  • Expose local web services securely to selected peers or the public through serve/funnel.
  • Transfer files between machines on the mesh without configuring external storage.
  • Route traffic through an exit node for testing or egress policy control.

Best practices

  • Run tailscale up on each device and verify tailscale status before operations.
  • Use tailscale ssh user@hostname for explicit identity and auditability.
  • Prefer tailscale serve for peer-only exposure and tailscale funnel for controlled public access.
  • Use tailscale file cp/get for ad-hoc transfers; keep large or frequent transfers on dedicated storage.
  • Set and clear exit nodes deliberately and confirm with tailscale set --exit-node= and tailscale set --exit-node=.

Example use cases

  • Quickly SSH into a lab workstation from home using tailscale ssh without punch holes in the lab firewall.
  • Expose a local development server to teammates for testing with tailscale serve http://localhost:8080.
  • Provide a single public endpoint to an internal service during a demo via tailscale funnel 443.
  • Copy configuration files from a remote sensor to a central host with tailscale file cp.
  • Route developer traffic through a staging gateway using tailscale set --exit-node for consistent egress IP.

FAQ

Can I use this skill without installing Tailscale locally?

No. This skill issues Tailscale CLI commands, so the Tailscale client must be installed and authenticated on the host where commands run.

Is exposing services via serve public by default?

No. tailscale serve exposes services within the mesh by default; use tailscale funnel to provide controlled public access.