Tencent Cloud TIONE

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This appears to be a coherent read-only Tencent Cloud TI-ONE query skill, but it needs Tencent Cloud API keys and can return sensitive cloud logs and resource details.

Before installing, confirm you are comfortable giving the skill Tencent Cloud read access through API keys. Prefer a dedicated least-privileged read-only key, install dependencies from trusted package sources, and be careful when asking it to retrieve logs or service call information because those outputs may contain sensitive details.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The skill can view TI-ONE resources and related cloud information allowed by the provided Tencent Cloud credentials.

Why it was flagged

The skill requires Tencent Cloud API credentials to access the user's cloud account. This is expected for the Tencent Cloud query purpose, but those keys may carry broad account privileges if not scoped carefully.

Skill content
使用环境变量中的凭证(`TENCENTCLOUD_SECRET_ID` / `TENCENTCLOUD_SECRET_KEY`)进行身份认证。
Recommendation

Use a least-privileged Tencent Cloud key limited to the needed TI-ONE read-only Describe permissions, and avoid using administrator or broadly scoped keys.

What this means

User requests can cause the agent to query Tencent Cloud through tccli and return cloud metadata or logs.

Why it was flagged

The scripts invoke the Tencent Cloud CLI with parameters. The provided wrappers use fixed Describe-style actions and quoted argument arrays, making this purpose-aligned rather than evidence of unsafe shell behavior.

Skill content
result=$(tccli tione "$action" --region "$region" "${extra_args[@]}" 2>&1)
Recommendation

Keep usage to the listed scripts and review requested resource IDs, regions, and filters before querying broad account data.

What this means

Installation will rely on the package sources available in the user's environment.

Why it was flagged

The skill depends on external package-manager installs and does not pin exact package versions in the artifact. This is common for CLI-based integrations but is still a supply-chain consideration.

Skill content
pip3 install tccli
apt install jq
Recommendation

Install tccli and jq from trusted repositories, consider pinning versions in managed environments, and avoid untrusted mirrors.

What this means

Sensitive log contents may appear in the conversation or downstream agent context.

Why it was flagged

The skill can retrieve cloud logs and print them into the agent context. Logs may contain operational details, identifiers, endpoints, or accidental secrets, although the artifacts do not show persistence or exfiltration.

Skill content
result=$(call_tione_api "DescribeLogs" "$region" "${extra_args[@]}")
format_json "$result"
Recommendation

Query narrow time ranges and specific resources, avoid sharing returned logs unnecessarily, and redact secrets or sensitive payloads before reuse.