Shadow Traffic Tester
Analysis
This skill is coherent for shadow traffic testing, but it asks an agent/operator to change live Kubernetes resources and mirror production requests without enough visible safeguards.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
kubectl get deployment "$SERVICE_NAME" -n "$NAMESPACE" -o json | python3 -c "..." | kubectl apply -f -
The setup workflow generates a modified Kubernetes deployment and pipes it directly into kubectl apply, which can mutate a live cluster using the current Kubernetes context.
mirrorPercentage:
value: 100.0The Istio example mirrors 100% of production traffic to the shadow service, which can increase load and can trigger downstream side effects if the shadow service is not isolated.
Source: unknown; Homepage: none; Required binaries (all must exist): none
The registry metadata does not provide provenance or dependency declarations even though the skill's instructions rely on Kubernetes command-line tooling.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
kubectl logs -l app="$SERVICE_NAME",version=v1 -n "$NAMESPACE" --tail=1000 --since=1h ... > /tmp/prod-access.log
The analysis workflow reads production service logs through kubectl and writes them locally, implying use of an authenticated Kubernetes identity with access to production workloads.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
mirror_request_body on; ... proxy_pass http://shadow$request_uri;
The Nginx mirroring example forwards full production request bodies to a shadow service, but the artifact does not define filtering, redaction, endpoint exclusions, or data-boundary controls.
