Gws Cloudidentity

v1.0.0

Google Cloud Identity: Manage identity groups and memberships.

0· 264·2 current·3 all-time
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The skill is an instruction-only wrapper around the 'gws' CLI for Cloud Identity operations. Requiring the 'gws' binary is coherent with the description. However, the SKILL.md points to ../gws-shared/SKILL.md for auth/global flags/security rules — the skill does not declare any credentials itself, which is an unexpected delegation and creates an information gap about how auth is performed.
!
Instruction Scope
Instructions explicitly tell the agent to read a sibling file ('../gws-shared/SKILL.md') for auth and security rules and, if missing, to run 'gws generate-skills' to create it. That directs the agent to access and potentially create files outside the skill's folder (possible creation of auth/config artifacts). The rest of the SKILL.md guides the agent to run arbitrary 'gws cloudidentity <resource> <method> [flags]' commands which can perform highly privileged actions (delete groups, wipe devices, change memberships). The combination of file access instructions plus powerful CLI actions is broader than the skill's declared requirements alone imply.
Install Mechanism
Instruction-only skill with no install spec and no code files. This is low risk in terms of on-disk installation by the skill itself. The only binary requirement is 'gws' which must already exist on PATH.
!
Credentials
The skill declares no required environment variables or primary credential, yet its prerequisite references an external shared SKILL.md for authentication. This is inconsistent: managing Cloud Identity requires authenticated Google credentials (OAuth, service account, or gcloud ADC). The skill gives no visibility into what credentials will be used, how they are created, or where they are stored.
Persistence & Privilege
always is false and there is no install that embeds the skill persistently. However, the instructions may cause the agent to generate or read a shared configuration file ('gws generate-skills' / '../gws-shared/SKILL.md'), which could create persistent auth/config artifacts on disk. Autonomous invocation is allowed (default) — combine that with unclear auth handling and powerful API actions to get elevated impact.
What to consider before installing
This skill delegates authentication to a sibling file ('../gws-shared/SKILL.md') or to running 'gws generate-skills' but does not declare any credential requirements. Before installing or invoking it, verify the source and trustworthiness of the 'gws' CLI and the 'gws-shared' artifacts: inspect the contents of ../gws-shared/SKILL.md (or the files generated by 'gws generate-skills') to see what credentials or tokens would be created or used. Only grant least-privilege Google IAM roles required for the specific operations you need (avoid owner/editor). If you cannot inspect the shared SKILL or the 'gws' binary comes from an unknown origin, run in a sandbox or decline installation. Be especially cautious because the CLI can perform destructive, high-privilege actions (deleting groups, wiping devices, modifying memberships).

Like a lobster shell, security has layers — review code before you run it.

Plugin bundle (nix)
Skill pack · CLI binary · Config
SKILL.mdCLIConfig
CLI help (from plugin)
gws cloudidentity --help

Runtime requirements

Binsgws
latestvk97bd8y0h5dy20s6m42x9vy4f182826h
264downloads
0stars
1versions
Updated 1mo ago
v1.0.0
MIT-0

cloudidentity (v1)

PREREQUISITE: Read ../gws-shared/SKILL.md for auth, global flags, and security rules. If missing, run gws generate-skills to create it.

gws cloudidentity <resource> <method> [flags]

API Resources

customers

  • userinvitations — Operations on the 'userinvitations' resource

devices

  • cancelWipe — Cancels an unfinished device wipe. This operation can be used to cancel device wipe in the gap between the wipe operation returning success and the device being wiped. This operation is possible when the device is in a "pending wipe" state. The device enters the "pending wipe" state when a wipe device command is issued, but has not yet been sent to the device. The cancel wipe will fail if the wipe command has already been issued to the device.
  • create — Creates a device. Only company-owned device may be created. Note: This method is available only to customers who have one of the following SKUs: Enterprise Standard, Enterprise Plus, Enterprise for Education, and Cloud Identity Premium
  • delete — Deletes the specified device.
  • get — Retrieves the specified device.
  • list — Lists/Searches devices.
  • wipe — Wipes all data on the specified device.
  • deviceUsers — Operations on the 'deviceUsers' resource

groups

  • create — Creates a Group.
  • delete — Deletes a Group.
  • get — Retrieves a Group.
  • getSecuritySettings — Get Security Settings
  • list — Lists the Group resources under a customer or namespace.
  • lookup — Looks up the resource name of a Group by its EntityKey.
  • patch — Updates a Group.
  • search — Searches for Group resources matching a specified query.
  • updateSecuritySettings — Update Security Settings
  • memberships — Operations on the 'memberships' resource

inboundOidcSsoProfiles

  • create — Creates an InboundOidcSsoProfile for a customer. When the target customer has enabled Multi-party approval for sensitive actions, the Operation in the response will have "done": false, it will not have a response, and the metadata will have "state": "awaiting-multi-party-approval".
  • delete — Deletes an InboundOidcSsoProfile.
  • get — Gets an InboundOidcSsoProfile.
  • list — Lists InboundOidcSsoProfile objects for a Google enterprise customer.
  • patch — Updates an InboundOidcSsoProfile. When the target customer has enabled Multi-party approval for sensitive actions, the Operation in the response will have "done": false, it will not have a response, and the metadata will have "state": "awaiting-multi-party-approval".

inboundSamlSsoProfiles

  • create — Creates an InboundSamlSsoProfile for a customer. When the target customer has enabled Multi-party approval for sensitive actions, the Operation in the response will have "done": false, it will not have a response, and the metadata will have "state": "awaiting-multi-party-approval".
  • delete — Deletes an InboundSamlSsoProfile.
  • get — Gets an InboundSamlSsoProfile.
  • list — Lists InboundSamlSsoProfiles for a customer.
  • patch — Updates an InboundSamlSsoProfile. When the target customer has enabled Multi-party approval for sensitive actions, the Operation in the response will have "done": false, it will not have a response, and the metadata will have "state": "awaiting-multi-party-approval".
  • idpCredentials — Operations on the 'idpCredentials' resource

inboundSsoAssignments

  • create — Creates an InboundSsoAssignment for users and devices in a Customer under a given Group or OrgUnit.
  • delete — Deletes an InboundSsoAssignment. To disable SSO, Create (or Update) an assignment that has sso_mode == SSO_OFF.
  • get — Gets an InboundSsoAssignment.
  • list — Lists the InboundSsoAssignments for a Customer.
  • patch — Updates an InboundSsoAssignment. The body of this request is the inbound_sso_assignment field and the update_mask is relative to that. For example: a PATCH to /v1/inboundSsoAssignments/0abcdefg1234567&update_mask=rank with a body of { "rank": 1 } moves that (presumably group-targeted) SSO assignment to the highest priority and shifts any other group-targeted assignments down in priority.

policies

  • get — Get a policy.
  • list — List policies.

Discovering Commands

Before calling any API method, inspect it:

# Browse resources and methods
gws cloudidentity --help

# Inspect a method's required params, types, and defaults
gws schema cloudidentity.<resource>.<method>

Use gws schema output to build your --params and --json flags.

Comments

Loading comments...