EZ Unifi

WarnAudited by ClawScan on May 10, 2026.

Overview

The skill appears to be a legitimate UniFi management tool, but it gives the agent broad admin and raw API control over network infrastructure and handles powerful credentials in a risky way.

Install only if you are comfortable giving the agent administrative control over your UniFi controller. Use a dedicated least-privilege local account, protect the `.env` file, run it only on a trusted network, and require explicit confirmation before restarts, upgrades, firewall/traffic changes, WiFi password changes, PoE power actions, or raw API calls.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A mistaken or overly broad agent action could restart devices, change network behavior, disconnect clients, or alter controller settings.

Why it was flagged

The skill exposes a raw UniFi API command path in addition to higher-level commands. With admin credentials, this can bypass safer scoped workflows and perform arbitrary controller operations.

Skill content
uv run unifi.py raw POST /cmd/devmgr '{"cmd":"restart","mac":"..."}'
Recommendation

Use only with explicit user requests, require confirmation before disruptive changes, and consider removing or restricting raw API access unless the user specifically needs it.

What this means

If used on an untrusted network or with a spoofed controller address, UniFi admin credentials could be exposed or misused.

Why it was flagged

The script reads a stored UniFi controller password and logs in with certificate verification disabled. This is understandable for local self-signed UniFi controllers, but it weakens protection for powerful admin credentials.

Skill content
password = os.environ.get("UNIFI_PASSWORD", "") ... ssl_context=False,  # Disable SSL verification for self-signed certs
Recommendation

Use a dedicated least-privilege local account, store credentials carefully, restrict access to the `.env` file, and prefer trusted controller certificates or a trusted local network.

What this means

The agent may be able to manage or disrupt much of the UniFi network depending on the account role.

Why it was flagged

The skill openly asks for a high-privilege UniFi account. This is aligned with network administration, but users should recognize that these credentials authorize major controller changes.

Skill content
Set Role to **Super Admin** or **Site Admin** ... Then provide: - Controller IP ... - Username - Password
Recommendation

Prefer Site Admin over Super Admin where possible, create a dedicated account for this skill, and disable or remove the account when no longer needed.

What this means

Future dependency changes could alter behavior or introduce vulnerabilities even if the skill file itself stays the same.

Why it was flagged

The script declares runtime Python dependencies with lower-bound version ranges and no lockfile shown. This is normal for a lightweight Python CLI, but it means installs may pull newer dependency versions from the package index.

Skill content
dependencies = [
#     "aiounifi>=88",
#     "aiohttp>=3.9.0",
#     "python-dotenv>=1.0.0",
# ]
Recommendation

Use a trusted environment, consider pinning dependency versions, and review dependency provenance before using the skill on production networks.