iDRAC

ReviewAudited by ClawScan on May 1, 2026.

Overview

The artifacts look like a coherent iDRAC administration helper, but it handles server credentials and documents power-control operations that should be used only in a controlled admin context.

Before installing, confirm this will point only at the intended iDRAC management interface, use a dedicated low-privilege account if feasible, protect or remove the cached credential file, and require explicit human approval before any shutdown, restart, or BIOS-changing action.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the credential file or password-manager item is exposed or misused, someone could access the iDRAC interface for the configured server.

Why it was flagged

The skill may retrieve iDRAC credentials from a password manager and store them locally; this is expected for iDRAC administration, but the credentials can grant server management access.

Skill content
**1password** | `OP_ITEM="item-name"` | Pulls username:password via `op` CLI, caches to `~/.idrac-credentials` |
Recommendation

Use a least-privileged iDRAC account where possible, keep ~/.idrac-credentials mode 600, verify the intended 1Password item, and delete cached credentials when no longer needed.

What this means

A mistaken or poorly reviewed power action could shut down or restart a physical server.

Why it was flagged

The skill explicitly supports high-impact server management actions, but it also instructs the agent to obtain confirmation before destructive operations.

Skill content
**Destructive** (power off, restart, BIOS changes) → Confirm with user first
Recommendation

Only approve power or BIOS-changing actions when you are sure of the target server and operational impact.

What this means

On an untrusted or compromised network, credentials or results could be exposed to a man-in-the-middle attack.

Why it was flagged

The skill intentionally disables certificate verification for iDRAC HTTPS calls; this is common for self-signed management controllers but weakens protection against spoofing on untrusted networks.

Skill content
**TLS verification disabled** (`-k`) — iDRAC uses self-signed certs (acceptable for private networks)
Recommendation

Use this only on a trusted management network, or adapt the script to trust the iDRAC certificate instead of using `-k`.