Auth0 Cli

PassAudited by VirusTotal on May 6, 2026.

Overview

Type: OpenClaw Skill Name: auth0-cli Version: 1.0.1 The auth0-cli skill bundle is a comprehensive and well-documented reference for the official Auth0 CLI tool, designed to help an AI agent manage Auth0 tenants. It provides detailed instructions and examples for managing applications, users, roles, and security settings in SKILL.md and references/cli.md, supported by a thorough suite of functional tests in tests/evals.json. No indicators of malicious intent, such as data exfiltration, unauthorized execution, or deceptive prompt injection, were found.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If used carelessly, direct API calls could change sensitive Auth0 tenant settings beyond the user’s immediate intent.

Why it was flagged

The skill explicitly supports direct Management API use, which is powerful and can bypass narrower CLI workflows, but this is disclosed and aligned with the Auth0 administration purpose.

Skill content
or when you need to call the Auth0 Management API directly
Recommendation

Prefer dedicated scoped CLI commands when available, and require the user to confirm the tenant, endpoint, method, and payload before direct Management API calls.

What this means

A mistaken command could delete or alter Auth0 resources and disrupt login flows for applications or users.

Why it was flagged

The reference documents a no-confirm delete command for Auth0 applications. This is a legitimate CLI option, but destructive tenant changes are high impact.

Skill content
auth0 apps delete <client-id> --force          # skip confirmation
Recommendation

Do not use --force or destructive commands unless the user has explicitly confirmed the exact resource and tenant.

What this means

Anyone with these credentials may be able to administer the Auth0 tenant depending on granted scopes.

Why it was flagged

The CLI can authenticate with machine credentials. This is expected for Auth0 CI/CD administration, but those credentials are sensitive.

Skill content
auth0 login --domain <tenant>.auth0.com --client-id <id> --client-secret <secret>
Recommendation

Use least-privilege Auth0 applications and scopes, avoid pasting secrets into chat unless necessary, and rotate any exposed secrets.

What this means

Secrets may appear in the terminal or agent context and could be accidentally shared or retained.

Why it was flagged

The documented CLI can display Auth0 client secrets and signing keys in output. This is purpose-aligned but sensitive.

Skill content
`--reveal-secrets` | `-r` | Show client secret and signing keys
Recommendation

Only reveal secrets when necessary, keep outputs out of shared logs/chats, and redact secrets before sharing command results.

What this means

The installed Auth0 CLI will run locally with the user’s account permissions and authenticated Auth0 access.

Why it was flagged

The skill depends on installing and running an external CLI binary via Homebrew, which is normal for this purpose but still a supply-chain dependency.

Skill content
brew | package: auth0/auth0-cli/auth0 | creates binaries: auth0
Recommendation

Install from the expected Auth0 Homebrew tap, keep the CLI updated, and verify commands before running them against production tenants.