Service Dependency Mapper
Analysis
This instruction-only skill is aligned with read-only service dependency mapping, but it may surface internal service, cluster, and connection details when its example commands are run.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
rg "https?://[a-z][-a-z0-9]*(\.[a-z][-a-z0-9]*)*[:/]" ...; kubectl get services -A -o json | python3 -c
The skill documents shell commands for repository and cluster discovery. This is expected for dependency mapping, but it is still tool execution that should be user-approved and run in the correct environment.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
kubectl get services -A -o json ...; istioctl proxy-config cluster <pod-name>
These runtime discovery examples use the user's existing Kubernetes and service-mesh access, including all namespaces for services. That access is purpose-aligned but can cover broad production infrastructure.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
rg "DATABASE_URL|REDIS_URL|MONGO_URI|POSTGRES_|MYSQL_|AMQP_URL|KAFKA_BROKER"
The static discovery command may print connection configuration lines, which can include secrets, internal hosts, or broker addresses. The artifact does not show persistence or exfiltration, but this data may enter the agent context.
