grafana-insepction

PassAudited by ClawScan on May 10, 2026.

Overview

This appears to be a purpose-aligned Grafana inspection tool, but users should review its API-key use, local report output, and packaging/documentation inconsistencies before running it.

Before running this skill, use a dedicated Viewer-scoped Grafana API key, confirm the configured Grafana URL is yours, prefer HTTPS for non-local Grafana instances, and keep generated reports private. Also note that the supplied artifacts do not clearly implement the advertised screenshot feature and include minor command/dependency inconsistencies, so verify the full script and dependencies first.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A Grafana API key can expose dashboards, alerts, and datasource metadata available to that key.

Why it was flagged

The skill requires a Grafana API key for inspection. This is expected for the stated purpose and the documentation recommends Viewer scope, but users should still treat the token as account access.

Skill content
`api_key` | API Key(API 巡检用) | ✅ ... 创建 Viewer 权限的 Key
Recommendation

Use a dedicated Viewer-scoped token, avoid admin tokens, verify the Grafana URL before running, and revoke the token when no longer needed.

What this means

Generated reports could reveal internal monitoring information if stored in a shared directory or sent to others.

Why it was flagged

Inspection results are persisted to local report files. The reports are purpose-aligned, but may contain internal Grafana dashboard, alert, and datasource details.

Skill content
json_path = f"inspection_{timestamp}.json" ... json.dump(results, f, indent=2, ensure_ascii=False) ... md_path = f"inspection_{timestamp}.md"
Recommendation

Keep generated reports private, review them before sharing, and delete them when no longer needed.

What this means

The skill may fail until dependencies are installed, and users may need to choose a trusted source for those dependencies.

Why it was flagged

The skill has no install specification or dependency declaration, but the script depends on the third-party requests package. This is a minor setup/provenance gap rather than evidence of hidden installation behavior.

Skill content
import requests
Recommendation

Install Python dependencies from a trusted package index/environment and verify the full script contents before running.