Vercel Speed Audit

PassAudited by VirusTotal on May 11, 2026.

Overview

Type: OpenClaw Skill Name: vercel-speed-audit Version: 1.0.0 The skill bundle provides comprehensive documentation and instructions for optimizing Vercel deployments, including the use of Vercel CLI commands and GitHub Actions workflows. While the content is educational and benign in intent, it involves powerful commands such as `vercel deploy`, `vercel build`, and `vercel env add`. These commands interact directly with cloud infrastructure and sensitive credentials (Vercel API tokens, even when handled as GitHub secrets). If an AI agent were to execute these commands without robust sandboxing, explicit user confirmation, and stringent input validation, there is a significant risk of unintended deployments, configuration changes, or potential misuse of credentials if the agent's prompt handling or execution environment is compromised. There is no evidence of intentional malicious behavior like data exfiltration, backdoors, or obfuscation within the provided files.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the token is too broad or exposed, someone with access to the workflow or secret could affect Vercel deployments or access deployment-related configuration.

Why it was flagged

The optional CI workflow uses a Vercel token to pull production environment configuration into GitHub Actions, so token scope and CI secret controls matter.

Skill content
run: vercel pull --yes --environment=production --token=${{ secrets.VERCEL_TOKEN }}
Recommendation

Use least-privilege Vercel tokens, store them as protected GitHub secrets or environments, restrict production workflows with branch protections/approvals, and rotate tokens if exposed.

What this means

A misconfigured workflow could deploy the wrong build or change production behavior without the review process the user expects.

Why it was flagged

The guide includes a production deployment command in an optional GitHub Actions workflow. This is purpose-aligned, but it is a high-impact operation.

Skill content
DEPLOY_URL=$(vercel deploy --prebuilt --prod --token=${{ secrets.VERCEL_TOKEN }})
Recommendation

Use protected branches, required checks, deployment environments, and manual approvals where appropriate before enabling automated production deploys.

What this means

CI builds depend on the integrity and version of external tooling and GitHub Actions used by the workflow.

Why it was flagged

The optional workflow installs the Vercel CLI during CI. This is expected for the deployment pattern, but it depends on an external package at install time.

Skill content
run: pnpm add -g vercel
Recommendation

Pin tool versions where possible, use trusted actions/packages, keep lockfiles stable, and review CI dependency changes.

What this means

Secrets used as build-time literals may be harder to rotate and can appear in server build artifacts that CI or deployment systems store.

Why it was flagged

The SvelteKit guidance explains that build-time private environment values can be inlined into bundles. That is a valid optimization, but sensitive values need careful handling.

Skill content
import { DATABASE_URL } from '$env/static/private'; ... Inlined at BUILD TIME — becomes a literal string in the bundle
Recommendation

Use runtime private environment access for secrets that should not be baked into build artifacts, and protect any CI artifacts that contain server output.