DevOps Agent

ReviewAudited by ClawScan on May 10, 2026.

Overview

This appears to be a real DevOps assistant, but its monitoring defaults and cloud-backup authority need careful review before use on a server.

Use this only on servers where you intend to allow real DevOps changes. Start with --dry-run, review generated Nginx/systemd/cron/backup scripts, restrict Prometheus/exporter access, use dedicated cloud backup credentials, and confirm rollback and cleanup steps before enabling persistent services.

Findings (6)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If installed on an internet-reachable server, monitoring data or lifecycle controls could be exposed beyond the intended operator.

Why it was flagged

The Prometheus service template binds to all interfaces and enables its lifecycle endpoint; the artifacts do not show authentication, a firewall rule, or private-network restriction.

Skill content
--web.listen-address=0.0.0.0:9090 ... --web.enable-lifecycle
Recommendation

Bind monitoring services to localhost or a private interface by default, add authentication/reverse-proxy protection, and require explicit confirmation of exposed ports.

What this means

Backups may be written using the machine's default cloud account/profile, which could be broader than intended or point to the wrong account.

Why it was flagged

The backup generator uploads backups using provider CLIs such as AWS/OSS, which normally rely on locally configured cloud credentials; this is expected for remote backups but not declared as a credential contract.

Skill content
# === 上传到 S3 === ... aws s3 cp
Recommendation

Use dedicated least-privilege backup credentials, require explicit profile/account/bucket confirmation, and document the required cloud credential setup.

What this means

A repository's build scripts, Dockerfile, or docker-compose file can run code on the target server and create long-running services.

Why it was flagged

The deploy workflow intentionally clones a user-provided repository and runs build or container commands from it. That is purpose-aligned for deployment, but it executes project-controlled code.

Skill content
git clone <repo-url> "$DEPLOY_DIR" ... npm ci && npm run build ... docker compose up -d
Recommendation

Deploy only trusted repositories, review package scripts/Dockerfiles/compose files first, and use dry-run plus explicit approval before running builds or containers.

What this means

Services and monitoring components may continue running after the agent session ends or after a reboot.

Why it was flagged

The systemd templates create services that restart automatically and are enabled to start at boot. This is normal for DevOps deployment but creates persistence.

Skill content
Restart=always ... sudo systemctl enable {{APP_NAME}}
Recommendation

Keep a list of created service names, review rollback instructions, and disable/remove services when they are no longer needed.

What this means

Secrets or private application files could be duplicated into local snapshots and remain there until manually removed.

Why it was flagged

Rollback snapshots copy the deployment directory into a persistent snapshot location. Deployment directories often contain .env files or other secrets.

Skill content
cp -r "$DEPLOY_DIR" "$SNAPSHOT_DIR/app_backup"
Recommendation

Protect snapshot directories with restrictive permissions, define retention/cleanup, and consider excluding or encrypting secret files.

What this means

If followed, the user would run a remote installation script with elevated impact on the system.

Why it was flagged

The preflight helper suggests a remote installer piped to a shell for Docker. It appears to be a user-directed install suggestion, not automatic execution.

Skill content
docker)     echo "curl -fsSL https://get.docker.com | sh" ;;
Recommendation

Prefer distribution package managers, pinned versions, checksums, or vendor-documented installation steps reviewed by the operator.