Lybic Sandbox

ReviewAudited by ClawScan on May 1, 2026.

Overview

This skill transparently provides broad Lybic cloud-sandbox control, which is purpose-aligned but should be used carefully because it can run code, manage cloud resources, use an API key, and expose sandbox services.

Before installing, make sure you trust the Lybic SDK source, configure a least-privileged API key, and instruct the agent to ask before deleting sandboxes/projects, running arbitrary commands, or exposing ports publicly.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent using this skill can run commands inside Lybic sandboxes and create or delete cloud resources, which may affect data in those sandboxes or create usage costs.

Why it was flagged

The skill gives the agent broad remote sandbox-control capabilities, including command execution and resource deletion. This is central to the sandbox-control purpose and is clearly disclosed, but it is still powerful.

Skill content
Execute shell commands and scripts ... Create sandboxes ... List, get details, and delete sandboxes
Recommendation

Use this skill only with clear user intent for high-impact actions such as deleting resources, running arbitrary commands, or creating externally reachable services.

What this means

Anyone or any agent with access to the configured API key may be able to manage Lybic sandboxes and related organization resources.

Why it was flagged

The skill requires an organization-scoped Lybic API key to operate. This is expected for the integration, but the key can authorize cloud resource management.

Skill content
Users need Lybic credentials set via environment variables: `LYBIC_ORG_ID` - Organization ID; `LYBIC_API_KEY` - API key
Recommendation

Use the least-privileged Lybic API key available, avoid hardcoding real keys in code, and rotate the key if it may have been exposed.

What this means

A service or data inside the sandbox could become reachable from the internet if a port mapping is created.

Why it was flagged

The skill can expose services running inside a sandbox through public URLs. This is a documented feature, but it changes the data boundary of the sandbox.

Skill content
HTTP port mapping for web services - Forward sandbox ports to public URLs
Recommendation

Only expose sandbox ports when needed, avoid serving sensitive data, use access controls where available, and delete mappings when finished.

What this means

Installing an unpinned package may pull a newer or unexpected SDK version in the future.

Why it was flagged

The skill depends on an external Python SDK installed from a package source without a pinned version in the provided artifacts. This is normal for an SDK-based integration but is a supply-chain consideration.

Skill content
pip install lybic
Recommendation

Install the SDK from a trusted package index and consider pinning a known-good version in controlled environments.