Alicloud Data Lake Dlf
Analysis
This is a coherent Alibaba Cloud Data Lake management helper, but it can use Alibaba Cloud credentials and perform user-requested resource changes, so use least-privilege access.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Change/configure: prefer `Create*` / `Update*` / `Modify*` / `Set*` APIs for mutations.
The skill explicitly supports mutating DataLake resources through Alibaba Cloud APIs. That is coherent with its purpose, and the workflow includes confirming region, resource identifiers, and desired action, but incorrect mutations could affect cloud resources.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Environment variables: `ALICLOUD_ACCESS_KEY_ID` / `ALICLOUD_ACCESS_KEY_SECRET` / `ALICLOUD_REGION_ID` ... Shared config file: `~/.alibabacloud/credentials`
The skill expects Alibaba Cloud account credentials, including a local shared credentials file. This is purpose-aligned for managing Alibaba Cloud resources, and there is no artifact evidence of credential leakage, but the authority is sensitive.
