This skill provides a step-by-step pattern to expose a locally running server to the public internet using ngrok invoked as a Python package. It covers installation guidance, storing an authtoken in the agent workspace, launching a background tunnel process, and reliably reporting the public URL back to the user. The instructions emphasise invoking ngrok through Python (not a standalone binary) and include a safe background-run pattern that writes the tunnel URL to a file the agent can read.
Use this skill when a user needs a temporary public URL for a development server, to accept incoming webhooks, demo a local site, or allow remote testing without deploying. It's intended for short-lived developer sessions (free tier) and notes differences for paid/static domains.
This skill is written for lightweight Python-based agent runtimes that can run background Python processes and use shell_async/shell tools (MMClaw-style agents). Compatible targets: Python-based agents and CLIs that support background execution and file I/O.
This skill has not been reviewed by our automated audit pipeline yet.