Tailscale
Manage Tailscale tailnet via CLI and API. Use when the user asks to "check tailscale status", "list tailscale devices", "ping a device", "send file via tailscale", "tailscale funnel", "create auth key", "check who's online", or mentions Tailscale network management.
Why this rating
Deterministic checks triggered by the tool capabilities and evidence.
- Locality: Hybrid
Supports local CLI diagnostics plus authenticated tailnet API management.
- Data access: Sensitive
Exposes device inventory, network topology, keys, ACL, and DNS configuration.
- Action surface: Execute
Includes high-impact operations like `delete` device, auth key creation, and policy changes.
Best practices
Follow these steps to reduce risk when using this skill.
- Use short-lived API keys and scope them to least privilege for automation tasks.
- Require explicit confirmation before delete or broad policy changes.
- Audit device/key changes regularly in Tailscale admin logs.
Evidence links
Public sources backing the indicator assignments.
Always be careful when navigating away from the website.
Max-risk rule
If any capability reaches a higher level, the entire indicator level bumps up to keep ratings deterministic and easy to scan.