CI/CD Pipeline

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: cicd-pipeline Version: 1.0.0 The skill bundle provides comprehensive documentation and code examples for managing CI/CD pipelines with GitHub Actions. All presented commands and YAML snippets are standard for this purpose, utilizing common GitHub Actions and the `gh` CLI. There is no evidence of prompt injection against the agent, data exfiltration, malicious execution, persistence mechanisms, or obfuscation. Examples involving sensitive data like SSH keys or secrets are presented as user-facing instructions or workflow configurations, not as commands for the agent to execute against the user's environment.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A generated workflow could publish releases or otherwise modify repository state when matching tags or events occur.

Why it was flagged

The skill includes workflow templates that can create GitHub releases and require repository write permissions. This is coherent with CI/CD release automation, but it is a high-impact capability if applied without review.

Skill content
### Deploy to production on tag ... permissions:
      contents: write ... - uses: softprops/action-gh-release@v2
Recommendation

Review workflow triggers and permissions before committing. Use least-privilege permissions, protected branches/tags, environment approvals, and manual gates for production or release workflows.

What this means

If a workflow or referenced action is misconfigured or compromised, repository secrets or token permissions could be used to deploy, publish, or access protected resources.

Why it was flagged

The workflow examples use GitHub Actions secrets and the GitHub token for deployment and package publishing. This is expected for CI/CD, but it gives workflows delegated authority.

Skill content
DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }} ... password: ${{ secrets.GITHUB_TOKEN }}
Recommendation

Store only necessary secrets, scope tokens narrowly, prefer environment-scoped secrets and OIDC where possible, and avoid exposing secrets to untrusted pull-request contexts.

What this means

A changed or compromised third-party action could run code in CI with the workflow's available permissions and secrets.

Why it was flagged

The templates reference third-party GitHub Actions by tags rather than immutable commit SHAs. This is common in CI/CD examples, but those actions execute in the workflow environment.

Skill content
- uses: dtolnay/rust-toolchain@stable
      - uses: Swatinem/rust-cache@v2 ... - uses: softprops/action-gh-release@v2
Recommendation

Prefer trusted actions, review their permissions and maintainers, pin security-sensitive workflows to commit SHAs, and use dependency update tooling to manage action versions.