Initial commit: VaultMesh Skills collection

Collection of operational skills for VaultMesh infrastructure including:
- backup-sovereign: Backup and recovery operations
- btc-anchor: Bitcoin anchoring
- cloudflare-tunnel-manager: Cloudflare tunnel management
- container-registry: Container registry operations
- disaster-recovery: Disaster recovery procedures
- dns-sovereign: DNS management
- eth-anchor: Ethereum anchoring
- gitea-bootstrap: Gitea setup and configuration
- hetzner-bootstrap: Hetzner server provisioning
- merkle-forest: Merkle tree operations
- node-hardening: Node security hardening
- operator-bootstrap: Operator initialization
- proof-verifier: Cryptographic proof verification
- rfc3161-anchor: RFC3161 timestamping
- secrets-vault: Secrets management

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
This commit is contained in:
Vault Sovereign
2025-12-27 00:25:00 +00:00
commit eac77ef7b4
213 changed files with 11724 additions and 0 deletions

12
rfc3161-anchor/SKILL.md Normal file
View File

@@ -0,0 +1,12 @@
---
name: rfc3161-anchor
description: >
Timestamp ROOT.txt using RFC 3161 TSA, emit timestamp token (.tsr)
and PROOF.json. Designed to consume merkle-forest outputs.
version: 1.0.0
---
# RFC 3161 Anchor
Consumes a Merkle **ROOT.txt** and requests a trusted timestamp
from a TSA, producing a verifiable timestamp receipt.

View File

@@ -0,0 +1,11 @@
{
"name": "rfc3161-anchor",
"version": "1.0.0",
"defaults": {
"TSA_URL": "https://freetsa.org/tsr",
"HASH_ALG": "sha256",
"DRY_RUN": "1",
"REQUIRE_CONFIRM": "1",
"CONFIRM_PHRASE": "I UNDERSTAND THIS WILL ANCHOR A ROOT VIA TSA"
}
}

View File

@@ -0,0 +1,5 @@
#!/usr/bin/env bash
set -euo pipefail
command -v openssl >/dev/null || { echo "openssl required"; exit 1; }
command -v curl >/dev/null || { echo "curl required"; exit 1; }
echo "[OK] preflight"

View File

@@ -0,0 +1,6 @@
#!/usr/bin/env bash
set -euo pipefail
: "${ROOT_FILE:=ROOT.txt}"
: "${TSA_URL:=https://freetsa.org/tsr}"
echo "[PLAN] Will hash $ROOT_FILE and submit to $TSA_URL"
echo "[PLAN] Set DRY_RUN=0 to apply"

View File

@@ -0,0 +1,24 @@
#!/usr/bin/env bash
set -euo pipefail
: "${ROOT_FILE:=ROOT.txt}"
: "${TSA_URL:=https://freetsa.org/tsr}"
: "${DRY_RUN:=1}"
: "${CONFIRM_PHRASE:=I UNDERSTAND THIS WILL ANCHOR A ROOT VIA TSA}"
[[ "$DRY_RUN" == "0" ]] || { echo "DRY_RUN=1"; exit 1; }
echo "Type confirmation:"
read -r x; [[ "$x" == "$CONFIRM_PHRASE" ]] || exit 1
openssl ts -query -data "$ROOT_FILE" -sha256 -certreq -out request.tsq
curl -s -H "Content-Type: application/timestamp-query" \
--data-binary @request.tsq "$TSA_URL" > response.tsr
cat > PROOF.json <<EOF
{
"skill":"rfc3161-anchor",
"root_file":"$ROOT_FILE",
"tsa":"$TSA_URL",
"timestamp":"$(date -Iseconds)"
}
EOF
echo "[OK] anchored"

View File

@@ -0,0 +1,5 @@
#!/usr/bin/env bash
set -euo pipefail
[[ -f response.tsr ]] || { echo "missing tsr"; exit 1; }
echo "{ \"ok\": true }" > status_matrix.json
cat status_matrix.json

View File

@@ -0,0 +1,7 @@
#!/usr/bin/env bash
set -euo pipefail
cat > audit_report.md <<EOF
# RFC3161 Anchor Report
Generated: $(date -Iseconds)
EOF
cat audit_report.md