Grafana Lens

ReviewAudited by ClawScan on May 10, 2026.

Overview

Grafana Lens appears purpose-built for Grafana automation, but it gives an agent broad monitoring control and persistent data-collection abilities that need tighter user approval and scoping.

Install only if you want an agent to actively operate Grafana. Use a dedicated least-privilege Grafana token, test in a non-production workspace first, require confirmation for alert silences and Alloy pipeline changes, restrict log collection paths/sources, and verify redaction and retention settings before sending real prompts, logs, or infrastructure data to Grafana.

Findings (6)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent could mute Grafana alerts during an investigation, which may cause missed or delayed incident notifications.

Why it was flagged

This is a state-changing alert-management action. The visible instruction does not require explicit user approval, a time limit, or a specific alert/rule scope before silencing.

Skill content
Silence alerts during investigation — use `grafana_check_alerts` with action `silence` to prevent repeat notifications while investigating
Recommendation

Require explicit user confirmation, a bounded duration, and a named alert/rule scope before any silence operation; also provide an easy undo path.

What this means

Private operational logs, secrets accidentally present in logs, or noisy pipeline changes could be forwarded to Grafana and affect team monitoring.

Why it was flagged

The Alloy recipes can create broad local, container, and system log collection, sometimes without mandatory filters. The provided artifacts do not show mandatory approval, preview, or redaction for every such pipeline.

Skill content
`docker-logs` | `(none)` | Docker socket (opt: containerNames, excludeContainers); `file-logs` | `paths` (glob array) | Local files; `journal-logs` | `(none)` | systemd journal
Recommendation

Preview generated Alloy configs, require user confirmation before create/update, prefer narrow filters, enable redaction where possible, and document rollback/delete steps.

What this means

If given an over-privileged token, the agent may read sensitive observability data or modify dashboards, alerts, and related Grafana state.

Why it was flagged

The skill needs a Grafana API key and advertises broad read/write Grafana operations, so its effective authority depends on the token's Grafana permissions.

Skill content
requires config: grafana.url, grafana.apiKey; "You have full native Grafana access — query data, create dashboards, set alerts"
Recommendation

Use a dedicated least-privilege Grafana service account, prefer a non-production Grafana instance for testing, and rotate/revoke the token if behavior is unexpected.

What this means

Prompts, responses, application logs, and diagnostic events may become searchable in Grafana/Loki according to the configured retention and access controls.

Why it was flagged

The skill can persist sensitive agent conversation and application log content into Grafana/Loki. This is purpose-aligned for observability, but it is sensitive data handling.

Skill content
Logs → Loki: diagnostic events, LLM inputs/outputs, app log forwarding, security events ... Configurable content capture with secret redaction for privacy
Recommendation

Verify content-capture settings, redaction behavior, Grafana access controls, and retention policies before enabling this in a real workspace.

What this means

Grafana alert content can influence the agent's investigation workflow and may include sensitive labels, annotations, or links.

Why it was flagged

The skill can connect Grafana alert webhooks into the agent context. That is expected for alert investigation, but webhook origin and alert annotation content should be trusted and controlled.

Skill content
Run `grafana_check_alerts` with action `setup` once before alert notifications can reach the agent — this creates the webhook contact point
Recommendation

Restrict webhook sources to trusted Grafana instances, avoid putting secrets in alert annotations, and review automatically suggested investigations before high-impact follow-up actions.

What this means

Users have less external context for verifying the publisher, release history, or source code provenance before granting Grafana access.

Why it was flagged

The supplied registry metadata does not provide a source repository or homepage, limiting independent provenance review.

Skill content
Source: unknown; Homepage: none
Recommendation

Verify the publisher and package contents through ClawHub or another trusted channel before installing in a production environment.