Ink

WarnAudited by ClawScan on May 10, 2026.

Overview

The skill is coherent for managing Ink cloud resources, but it gives an agent broad account-changing power over deployments, databases, DNS, and secrets without clear approval or scoping guidance.

Install only if you want an agent to administer your Ink cloud account. Before use, verify the CLI source, use a limited credential, explicitly set the workspace/project, and require manual approval for deletes, DNS changes, secret replacement, token retrieval, and production deployments.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent might steer a general cloud or database task toward Ink when the user did not clearly choose that platform.

Why it was flagged

The invocation wording is broad enough that an agent could apply Ink workflows to ambiguous deployment, service, or database requests instead of first confirming the user wants Ink.

Skill content
Use this skill whenever the user mentions Ink, ml.ink, deployments, services, databases, or cloud infrastructure on Ink, even if they don't say "Ink" explicitly.
Recommendation

Ask the user to confirm Ink, the workspace, project, and intended target before taking action on ambiguous requests.

What this means

A mistaken or over-eager agent action could delete production resources, break DNS, replace secrets, or redeploy services without the user realizing the full impact.

Why it was flagged

The skill documents high-impact cloud mutations and destructive operations, including deletion of services/databases/DNS records and replacement of all secrets, while also promoting autonomous operation.

Skill content
fully autonomous agents can handle the entire lifecycle: create, deploy, monitor, and scale services without human intervention ... ink delete my-app ... ink db delete my-db ... ink dns delete example.com <record-id> ... ink secrets import my-app --file .env --replace
Recommendation

Require explicit user approval for delete, replace, DNS, secret, workspace, and deployment-changing commands; confirm target workspace/project/service/database/domain before execution.

What this means

The agent may act under the wrong Ink account or workspace, or expose generated service credentials in outputs or logs if not carefully controlled.

Why it was flagged

The skill can act using existing Ink credentials and can retrieve database or repository tokens, but the metadata declares no credential contract and the instructions do not clearly limit account, workspace, project, or token handling.

Skill content
CLI flags -- `--api-key`, `--workspace`, `--project`; Environment -- `INK_API_KEY`; Local config -- `.ink`; Global config -- `~/.config/ink/config` ... `ink db token my-db` ... `ink repos token my-app`
Recommendation

Use a least-privileged Ink credential, set workspace/project explicitly, avoid broad global config when possible, and do not display or store tokens unless the user asks.

What this means

Installing a global CLI changes the local environment and trusts the package source.

Why it was flagged

The skill instructs installation of a global CLI from npm or a Homebrew tap. This is expected for a cloud CLI skill, but the install source/version is not pinned in the artifact.

Skill content
npm install -g @mldotink/cli      # npm (macOS, Linux, Windows)
brew install mldotink/tap/ink     # Homebrew (macOS)
Recommendation

Verify the Ink CLI package and Homebrew tap, prefer pinned or documented versions where available, and install only from the official provider source.