Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
Interact with Proxmox VE via CLI API wrapper deployed on the PVE host. Manage VMs, containers, cluster status, and execute CLI commands through REST endpoints. --- name: pve_cli description: Interact with Proxmox VE via CLI API wrapper deployed on the PVE host. Manage VMs, containers, cluster status, and execute CLI commands through REST endpoints. --- Proxmox CLI API Skill Interact with Proxmox VE using a RESTful API wrapper that translates HTTP requests to CLI commands. Prerequisites The PVE CLI API must be running on the Proxmox host. See **Setup** below for installation Capability contract not published. No trust telemetry is available yet. Last updated 2/25/2026.
Freshness
Last checked 2/25/2026
Best For
pve_cli is best for general automation workflows where OpenClaw compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack
Interact with Proxmox VE via CLI API wrapper deployed on the PVE host. Manage VMs, containers, cluster status, and execute CLI commands through REST endpoints. --- name: pve_cli description: Interact with Proxmox VE via CLI API wrapper deployed on the PVE host. Manage VMs, containers, cluster status, and execute CLI commands through REST endpoints. --- Proxmox CLI API Skill Interact with Proxmox VE using a RESTful API wrapper that translates HTTP requests to CLI commands. Prerequisites The PVE CLI API must be running on the Proxmox host. See **Setup** below for installation
Public facts
4
Change events
1
Artifacts
0
Freshness
Feb 25, 2026
Capability contract not published. No trust telemetry is available yet. Last updated 2/25/2026.
Trust score
Unknown
Compatibility
OpenClaw
Freshness
Feb 25, 2026
Vendor
Karabright Dev
Artifacts
0
Benchmarks
0
Last release
Unpublished
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Capability contract not published. No trust telemetry is available yet. Last updated 2/25/2026.
Setup snapshot
git clone https://github.com/karabright-dev/openclaw-skill-pve-cli.gitSetup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Karabright Dev
Protocol compatibility
OpenClaw
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
6
Snippets
0
Languages
typescript
Parameters
bash
ssh root@YOUR_PVE_IP
bash
apt-get update apt-get install -y python3-flask
python
#!/usr/bin/env python3
"""Proxmox CLI API Wrapper - RESTful API for PVE CLI commands"""
import os
import re
import json
import subprocess
from datetime import datetime
from flask import Flask, request, jsonify
app = Flask(__name__)
CONFIG = {
'PORT': int(os.environ.get('PORT', 3000)),
'API_KEY': os.environ.get('PVE_API_KEY', 'pve-cli-api-key'),
'ALLOWED_COMMANDS': ['qm', 'pct', 'pvesh', 'pvecm', 'pveperf', 'pveversion',
'vzdump', 'qmrestore', 'lvcreate', 'lvremove', 'lvs', 'vgs', 'pvs']
}
def run_command(command, timeout=30):
"""Execute CLI command safely"""
cmd_base = command.split()[0]
if cmd_base not in CONFIG['ALLOWED_COMMANDS']:
return {'success': False, 'error': f"Command '{cmd_base}' not allowed"}
try:
result = subprocess.run(
command, shell=True, capture_output=True, text=True, timeout=timeout
)
return {
'success': result.returncode == 0,
'output': result.stdout or result.stderr,
'returncode': result.returncode
}
except Exception as e:
return {'success': False, 'error': str(e)}
# Authentication
@app.before_request
def check_auth():
if request.path == '/health':
return None
api_key = request.headers.get('X-API-Key') or request.args.get('api_key')
if api_key != CONFIG['API_KEY']:
return jsonify({'error': 'Unauthorized'}), 401
@app.route('/health')
def health():
return jsonify({'status': 'ok', 'timestamp': datetime.now().isoformat()})
@app.route('/vms')
def list_vms():
result = run_command('qm list')
return jsonify(result)
@app.route('/vms/<int:vmid>/start', methods=['POST'])
def start_vm(vmid):
return jsonify(run_command(f'qm start {vmid}'))
@app.route('/vms/<int:vmid>/stop', methods=['POST'])
def stop_vm(vmid):
return jsonify(run_command(f'qm stop {vmid}'))
@app.route('/containers')
def list_containers():
return jsonify(run_command('pct list'bash
cd /opt/pve-cli-api python3 server.py
bash
nohup python3 server.py > /var/log/pve-cli-api.log 2>&1 &
bash
curl http://localhost:3000/health
Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB OPENCLEW
Editorial quality
ready
Interact with Proxmox VE via CLI API wrapper deployed on the PVE host. Manage VMs, containers, cluster status, and execute CLI commands through REST endpoints. --- name: pve_cli description: Interact with Proxmox VE via CLI API wrapper deployed on the PVE host. Manage VMs, containers, cluster status, and execute CLI commands through REST endpoints. --- Proxmox CLI API Skill Interact with Proxmox VE using a RESTful API wrapper that translates HTTP requests to CLI commands. Prerequisites The PVE CLI API must be running on the Proxmox host. See **Setup** below for installation
Interact with Proxmox VE using a RESTful API wrapper that translates HTTP requests to CLI commands.
The PVE CLI API must be running on the Proxmox host. See Setup below for installation instructions.
ssh root@YOUR_PVE_IP
apt-get update
apt-get install -y python3-flask
Create /opt/pve-cli-api/server.py with the following content:
#!/usr/bin/env python3
"""Proxmox CLI API Wrapper - RESTful API for PVE CLI commands"""
import os
import re
import json
import subprocess
from datetime import datetime
from flask import Flask, request, jsonify
app = Flask(__name__)
CONFIG = {
'PORT': int(os.environ.get('PORT', 3000)),
'API_KEY': os.environ.get('PVE_API_KEY', 'pve-cli-api-key'),
'ALLOWED_COMMANDS': ['qm', 'pct', 'pvesh', 'pvecm', 'pveperf', 'pveversion',
'vzdump', 'qmrestore', 'lvcreate', 'lvremove', 'lvs', 'vgs', 'pvs']
}
def run_command(command, timeout=30):
"""Execute CLI command safely"""
cmd_base = command.split()[0]
if cmd_base not in CONFIG['ALLOWED_COMMANDS']:
return {'success': False, 'error': f"Command '{cmd_base}' not allowed"}
try:
result = subprocess.run(
command, shell=True, capture_output=True, text=True, timeout=timeout
)
return {
'success': result.returncode == 0,
'output': result.stdout or result.stderr,
'returncode': result.returncode
}
except Exception as e:
return {'success': False, 'error': str(e)}
# Authentication
@app.before_request
def check_auth():
if request.path == '/health':
return None
api_key = request.headers.get('X-API-Key') or request.args.get('api_key')
if api_key != CONFIG['API_KEY']:
return jsonify({'error': 'Unauthorized'}), 401
@app.route('/health')
def health():
return jsonify({'status': 'ok', 'timestamp': datetime.now().isoformat()})
@app.route('/vms')
def list_vms():
result = run_command('qm list')
return jsonify(result)
@app.route('/vms/<int:vmid>/start', methods=['POST'])
def start_vm(vmid):
return jsonify(run_command(f'qm start {vmid}'))
@app.route('/vms/<int:vmid>/stop', methods=['POST'])
def stop_vm(vmid):
return jsonify(run_command(f'qm stop {vmid}'))
@app.route('/containers')
def list_containers():
return jsonify(run_command('pct list'))
@app.route('/containers/<int:vmid>/start', methods=['POST'])
def start_container(vmid):
return jsonify(run_command(f'pct start {vmid}'))
@app.route('/containers/<int:vmid>/stop', methods=['POST'])
def stop_container(vmid):
return jsonify(run_command(f'pct stop {vmid}'))
@app.route('/containers/<int:vmid>/exec', methods=['POST'])
def exec_container(vmid):
data = request.get_json()
command = data.get('command')
if not command:
return jsonify({'error': 'Command required'}), 400
return jsonify(run_command(f'pct exec {vmid} -- {command}'))
@app.route('/cluster/status')
def cluster_status():
return jsonify(run_command('pvecm status'))
@app.route('/version')
def version():
return jsonify(run_command('pveversion -v'))
@app.route('/exec', methods=['POST'])
def exec_command():
data = request.get_json()
command = data.get('command')
if not command:
return jsonify({'error': 'Command required'}), 400
return jsonify(run_command(command))
if __name__ == '__main__':
print(f"PVE CLI API running on port {CONFIG['PORT']}")
app.run(host='0.0.0.0', port=CONFIG['PORT'])
cd /opt/pve-cli-api
python3 server.py
Or run in background:
nohup python3 server.py > /var/log/pve-cli-api.log 2>&1 &
curl http://localhost:3000/health
Should return: {"status": "ok"}
PORT env var)pve-cli-api-key (set via PVE_API_KEY env var)http://YOUR_PVE_IP:3000Once the API server is running, use this skill to interact with it:
export PVE_CLI_API_URL="http://192.168.68.58:3000"
export PVE_CLI_API_KEY="pve-cli-api-key"
List all VMs:
curl -H "X-API-Key: pve-cli-api-key" http://192.168.68.58:3000/vms
Get VM config:
curl -H "X-API-Key: pve-cli-api-key" http://192.168.68.58:3000/vms/100/config
Get VM status:
curl -H "X-API-Key: pve-cli-api-key" http://192.168.68.58:3000/vms/100/status
Start VM:
curl -X POST -H "X-API-Key: pve-cli-api-key" http://192.168.68.58:3000/vms/100/start
Stop VM:
curl -X POST -H "X-API-Key: pve-cli-api-key" http://192.168.68.58:3000/vms/100/stop
Shutdown VM:
curl -X POST -H "X-API-Key: pve-cli-api-key" "http://192.168.68.58:3000/vms/100/shutdown?timeout=180"
Reset VM:
curl -X POST -H "X-API-Key: pve-cli-api-key" http://192.168.68.58:3000/vms/100/reset
Reboot VM:
curl -X POST -H "X-API-Key: pve-cli-api-key" http://192.168.68.58:3000/vms/100/reboot
Suspend VM:
curl -X POST -H "X-API-Key: pve-cli-api-key" http://192.168.68.58:3000/vms/100/suspend
Resume VM:
curl -X POST -H "X-API-Key: pve-cli-api-key" http://192.168.68.58:3000/vms/100/resume
List all containers:
curl -H "X-API-Key: pve-cli-api-key" http://192.168.68.58:3000/containers
Get container config:
curl -H "X-API-Key: pve-cli-api-key" http://192.168.68.58:3000/containers/100/config
Start container:
curl -X POST -H "X-API-Key: pve-cli-api-key" http://192.168.68.58:3000/containers/100/start
Stop container:
curl -X POST -H "X-API-Key: pve-cli-api-key" http://192.168.68.58:3000/containers/100/stop
Shutdown container:
curl -X POST -H "X-API-Key: pve-cli-api-key" "http://192.168.68.58:3000/containers/100/shutdown?timeout=60"
Reboot container:
curl -X POST -H "X-API-Key: pve-cli-api-key" http://192.168.68.58:3000/containers/100/reboot
Execute command inside container:
curl -X POST -H "X-API-Key: pve-cli-api-key" \
-H "Content-Type: application/json" \
-d '{"command": "ls -la /"}' \
http://192.168.68.58:3000/containers/100/exec
Enter container (test connection):
curl -X POST -H "X-API-Key: pve-cli-api-key" \
http://192.168.68.58:3000/containers/100/enter
Get cluster status:
curl -H "X-API-Key: pve-cli-api-key" http://192.168.68.58:3000/cluster/status
Get cluster nodes:
curl -H "X-API-Key: pve-cli-api-key" http://192.168.68.58:3000/cluster/nodes
Get node performance:
curl -H "X-API-Key: pve-cli-api-key" http://192.168.68.58:3000/nodes/pve/perf
Get PVE version:
curl -H "X-API-Key: pve-cli-api-key" http://192.168.68.58:3000/version
List LVM volumes:
curl -H "X-API-Key: pve-cli-api-key" http://192.168.68.58:3000/storage/lvm
List volume groups:
curl -H "X-API-Key: pve-cli-api-key" http://192.168.68.58:3000/storage/vgs
Execute raw CLI command:
curl -X POST -H "X-API-Key: pve-cli-api-key" \
-H "Content-Type: application/json" \
-d '{"command": "qm list"}' \
http://192.168.68.58:3000/exec
Only these CLI commands are permitted via the API:
qm - QEMU/KVM VM managementpct - LXC container managementpvesh - Proxmox VE shellpvecm - Cluster managementpveperf - Performance testpveversion - Version infovzdump - Backup utilityqmrestore - Restore utilitylvcreate, lvremove, lvs - LVM commandsvgs, pvs - Volume group commandsAll responses are JSON:
{
"success": true|false,
"output": "command output as string",
"command": "the executed command",
"data": { ... },
"error": "error message if failed"
}
401 Unauthorized - Invalid or missing API key404 Not Found - Resource not found500 Internal Server Error - Server error#!/bin/bash
API_URL="http://192.168.68.58:3000"
API_KEY="pve-cli-api-key"
curl -s -H "X-API-Key: $API_KEY" "$API_URL/vms" | jq '.data[] | {vmid, name, status}'
#!/bin/bash
API_URL="http://192.168.68.58:3000"
API_KEY="pve-cli-api-key"
vms=$(curl -s -H "X-API-Key: $API_KEY" "$API_URL/vms" | jq -r '.data[] | select(.status == "stopped") | .vmid')
for vmid in $vms; do
echo "Starting VM $vmid..."
curl -s -X POST -H "X-API-Key: $API_KEY" "$API_URL/vms/$vmid/start"
done
#!/bin/bash
API_URL="http://192.168.68.58:3000"
API_KEY="pve-cli-api-key"
echo "Cluster Status:"
curl -s -H "X-API-Key: $API_KEY" "$API_URL/cluster/status" | jq '.data'
echo -e "\nNode Performance:"
curl -s -H "X-API-Key: $API_KEY" "$API_URL/nodes/pve/perf" | jq '.data'
RESTful API for Proxmox VE CLI - bridging HTTP and the command line
Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/karabright-dev-openclaw-skill-pve-cli/snapshot"
curl -s "https://xpersona.co/api/v1/agents/karabright-dev-openclaw-skill-pve-cli/contract"
curl -s "https://xpersona.co/api/v1/agents/karabright-dev-openclaw-skill-pve-cli/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Rank
70
AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs
Traction
No public download signal
Freshness
Updated 5d ago
Rank
70
Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | 🌟 Star if you like it!
Traction
No public download signal
Freshness
Updated 6d ago
Rank
70
The Frontend for Agents & Generative UI. React + Angular
Traction
No public download signal
Freshness
Updated 23d ago
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/karabright-dev-openclaw-skill-pve-cli/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/karabright-dev-openclaw-skill-pve-cli/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/karabright-dev-openclaw-skill-pve-cli/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/karabright-dev-openclaw-skill-pve-cli/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/karabright-dev-openclaw-skill-pve-cli/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/karabright-dev-openclaw-skill-pve-cli/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"OPENCLEW"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_OPENCLEW",
"generatedAt": "2026-04-17T00:32:55.384Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "OPENCLEW",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
}
],
"flattenedTokens": "protocol:OPENCLEW|unknown|profile"
}Facts JSON
[
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Karabright Dev",
"href": "https://github.com/karabright-dev/openclaw-skill-pve-cli",
"sourceUrl": "https://github.com/karabright-dev/openclaw-skill-pve-cli",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-02-25T02:23:54.647Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "OpenClaw",
"href": "https://xpersona.co/api/v1/agents/karabright-dev-openclaw-skill-pve-cli/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/karabright-dev-openclaw-skill-pve-cli/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-02-25T02:23:54.647Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/karabright-dev-openclaw-skill-pve-cli/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/karabright-dev-openclaw-skill-pve-cli/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub · GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to pve_cli and adjacent AI workflows.