alicloud-database-rds-supabase

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

The skill is coherent for Alibaba Cloud RDS management, but it can use cloud credentials to perform high-impact database and security changes without clear approval guardrails.

Install only if you intend to let the agent manage Alibaba Cloud RDS Supabase resources. Use a least-privilege RAM credential, specify the exact region and instance, and require confirmation before destructive, password, SSL, whitelist, batch, RAG, or custom-agent changes.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernMedium Confidence
ASI02: Tool Misuse and Exploitation
What this means

A mistaken or overly broad invocation could stop or delete an RDS Supabase instance, reset passwords, or change network/SSL access controls.

Why it was flagged

These are high-impact cloud database lifecycle and security operations. The skill asks clarifying questions when uncertain, but the artifacts do not clearly require explicit user confirmation, rollback planning, or scoping before destructive or security-changing actions.

Skill content
实例:`CreateAppInstance` / `DeleteAppInstance` / `StartInstance` / `StopInstance` / `RestartInstance` ... 安全:`ModifyInstanceIpWhitelist` ... `ModifyInstanceSSL`
Recommendation

Require explicit user confirmation for delete, stop, reset-password, SSL, whitelist, and batch changes; confirm instance ID, region, intended change, and rollback plan before calling the API.

What this means

If broad or root-like credentials are available, the agent could make account-wide RDS AI/Supabase changes beyond the intended instance.

Why it was flagged

The skill expects Alibaba Cloud account credentials and can fall back to a local credentials profile. This is purpose-aligned, but it gives the agent whatever cloud privileges those credentials have.

Skill content
环境变量(优先):`ALICLOUD_ACCESS_KEY_ID` / `ALICLOUD_ACCESS_KEY_SECRET` / `ALICLOUD_REGION_ID` ... 标准配置文件:`~/.alibabacloud/credentials`
Recommendation

Use a dedicated RAM user or role with least-privilege permissions limited to the intended RDS AI resources and region; avoid using broad personal or root AccessKeys.

What this means

Incorrect or untrusted custom-agent prompts/tools could influence future cloud-side AI assistant responses or workflows.

Why it was flagged

The referenced API surface includes persistent custom-agent prompts and tool settings. This is related to the RDS AI service, but changes to these fields can persist and affect future agent behavior.

Skill content
CreateCustomAgent(创建 Agent)- Name - SystemPrompt - EnableTools - Tools ... UpdateCustomAgent(更新 Agent)- CustomAgentId - Name / SystemPrompt / EnableTools / Tools
Recommendation

Treat custom-agent and RAG configuration changes as persistent; review prompts, tool lists, and data sources carefully before saving them.