Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Alicloud Database RDS Custom
v1.14.0查询阿里云自定义实例(RC 实例)。使用 aliyun CLI 调用 DescribeRCInstances API 查询 RDS 相关自定义实例。当用户需要查询 RC 实例、RDS 自定义实例或云资源时触发此技能。
⭐ 0· 232·0 current·0 all-time
byChijie@chucklong
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The name/description match the implemented behavior: the SKILL.md and included script call aliyun rds DescribeRCInstances and other RDS APIs to list and format RC (RDS Custom) instance data. The provided API reference and example commands align with the stated purpose.
Instruction Scope
The runtime instructions ask the user to install the aliyun CLI (via a one-line curl | bash installer) and run 'aliyun configure' to enter AccessKey ID/Secret, then run CLI commands and jq to parse results. These steps are appropriate for the stated task but they modify local CLI configuration and require network access and execution of a remote install script — so they expand scope beyond mere read-only examples.
Install Mechanism
There is no formal install spec in the registry (instruction-only), but SKILL.md recommends running /bin/bash -c "$(curl -fsSL https://aliyuncli.alicdn.com/install.sh)". That installer URL appears to be the official aliyun CDN; using curl | bash is common but higher-risk than a vetted package. The included bash script is small and harmless (it simply runs aliyun and jq).
Credentials
The skill metadata declares no required binaries, env vars, or config paths, yet the instructions and script require the 'aliyun' CLI and 'jq' on PATH and instruct the user to run 'aliyun configure' to store AccessKey ID/Secret locally. The omission in metadata is an incoherence: the skill will rely on credentials and config files (CLI config) even though none are declared.
Persistence & Privilege
The skill does not request always:true, but it does instruct users to run 'aliyun configure', which will write credentials to the local CLI config (persisted on disk). That persistence is expected for a cloud CLI but was not declared in required config paths. Autonomous invocation is allowed by default (disable-model-invocation=false); combined with the missing declarations this increases the importance of trusting the skill source.
What to consider before installing
This skill appears to do what it says (call aliyun CLI to list RDS Custom instances), but there are a few inconsistencies to consider before installing:
- The metadata does not declare required binaries or config paths, yet the skill requires the 'aliyun' CLI and 'jq' and asks you to run 'aliyun configure' to provide AccessKey ID/Secret. Expect the CLI to store credentials on disk (local aliyun CLI config). Only proceed if you trust the skill source.
- The instructions recommend executing a remote installer via curl | bash (https://aliyuncli.alicdn.com/install.sh). While this is likely the official installer, running remote install scripts is higher-risk; review the installer first or install the CLI via your OS package manager if available.
- Provide least-privilege credentials: create an AccessKey with read-only permissions limited to RDS listing if possible, rather than using a high-privilege key.
- Verify jq is installed (or adapt the script), and inspect the included script (scripts/query_rc_instances.sh) before executing it — it's short and only parses CLI output, but you should confirm no unexpected network calls or data exfiltration.
- If you are concerned about autonomous invocation, confirm how your agent platform grants skills access and consider limiting automatic invocation or reviewing logs when the skill runs.
If you want, I can: (1) point out the exact local paths where aliyun CLI stores credentials on your OS, (2) produce a checked, safer installation sequence that avoids curl | bash, or (3) produce a read-only ACL policy example for minimal credentials.Like a lobster shell, security has layers — review code before you run it.
latestvk975gc4x00f7dagwe1aedg08fx82vnaw
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
