Gws Cloudidentity
v1.0.0Google Cloud Identity: Manage identity groups and memberships.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill is an instruction-only wrapper around the 'gws' CLI for Cloud Identity operations. Requiring the 'gws' binary is coherent with the description. However, the SKILL.md points to ../gws-shared/SKILL.md for auth/global flags/security rules — the skill does not declare any credentials itself, which is an unexpected delegation and creates an information gap about how auth is performed.
Instruction Scope
Instructions explicitly tell the agent to read a sibling file ('../gws-shared/SKILL.md') for auth and security rules and, if missing, to run 'gws generate-skills' to create it. That directs the agent to access and potentially create files outside the skill's folder (possible creation of auth/config artifacts). The rest of the SKILL.md guides the agent to run arbitrary 'gws cloudidentity <resource> <method> [flags]' commands which can perform highly privileged actions (delete groups, wipe devices, change memberships). The combination of file access instructions plus powerful CLI actions is broader than the skill's declared requirements alone imply.
Install Mechanism
Instruction-only skill with no install spec and no code files. This is low risk in terms of on-disk installation by the skill itself. The only binary requirement is 'gws' which must already exist on PATH.
Credentials
The skill declares no required environment variables or primary credential, yet its prerequisite references an external shared SKILL.md for authentication. This is inconsistent: managing Cloud Identity requires authenticated Google credentials (OAuth, service account, or gcloud ADC). The skill gives no visibility into what credentials will be used, how they are created, or where they are stored.
Persistence & Privilege
always is false and there is no install that embeds the skill persistently. However, the instructions may cause the agent to generate or read a shared configuration file ('gws generate-skills' / '../gws-shared/SKILL.md'), which could create persistent auth/config artifacts on disk. Autonomous invocation is allowed (default) — combine that with unclear auth handling and powerful API actions to get elevated impact.
What to consider before installing
This skill delegates authentication to a sibling file ('../gws-shared/SKILL.md') or to running 'gws generate-skills' but does not declare any credential requirements. Before installing or invoking it, verify the source and trustworthiness of the 'gws' CLI and the 'gws-shared' artifacts: inspect the contents of ../gws-shared/SKILL.md (or the files generated by 'gws generate-skills') to see what credentials or tokens would be created or used. Only grant least-privilege Google IAM roles required for the specific operations you need (avoid owner/editor). If you cannot inspect the shared SKILL or the 'gws' binary comes from an unknown origin, run in a sandbox or decline installation. Be especially cautious because the CLI can perform destructive, high-privilege actions (deleting groups, wiping devices, modifying memberships).Like a lobster shell, security has layers — review code before you run it.
Plugin bundle (nix)
Skill pack · CLI binary · Config
SKILL.mdCLIConfig
CLI help (from plugin)
gws cloudidentity --help
Runtime requirements
Binsgws
latest
cloudidentity (v1)
PREREQUISITE: Read
../gws-shared/SKILL.mdfor auth, global flags, and security rules. If missing, rungws generate-skillsto create it.
gws cloudidentity <resource> <method> [flags]
API Resources
customers
userinvitations— Operations on the 'userinvitations' resource
devices
cancelWipe— Cancels an unfinished device wipe. This operation can be used to cancel device wipe in the gap between the wipe operation returning success and the device being wiped. This operation is possible when the device is in a "pending wipe" state. The device enters the "pending wipe" state when a wipe device command is issued, but has not yet been sent to the device. The cancel wipe will fail if the wipe command has already been issued to the device.create— Creates a device. Only company-owned device may be created. Note: This method is available only to customers who have one of the following SKUs: Enterprise Standard, Enterprise Plus, Enterprise for Education, and Cloud Identity Premiumdelete— Deletes the specified device.get— Retrieves the specified device.list— Lists/Searches devices.wipe— Wipes all data on the specified device.deviceUsers— Operations on the 'deviceUsers' resource
groups
create— Creates a Group.delete— Deletes aGroup.get— Retrieves aGroup.getSecuritySettings— Get Security Settingslist— Lists theGroupresources under a customer or namespace.lookup— Looks up the resource name of aGroupby itsEntityKey.patch— Updates aGroup.search— Searches forGroupresources matching a specified query.updateSecuritySettings— Update Security Settingsmemberships— Operations on the 'memberships' resource
inboundOidcSsoProfiles
create— Creates an InboundOidcSsoProfile for a customer. When the target customer has enabled Multi-party approval for sensitive actions, theOperationin the response will have"done": false, it will not have a response, and the metadata will have"state": "awaiting-multi-party-approval".delete— Deletes an InboundOidcSsoProfile.get— Gets an InboundOidcSsoProfile.list— Lists InboundOidcSsoProfile objects for a Google enterprise customer.patch— Updates an InboundOidcSsoProfile. When the target customer has enabled Multi-party approval for sensitive actions, theOperationin the response will have"done": false, it will not have a response, and the metadata will have"state": "awaiting-multi-party-approval".
inboundSamlSsoProfiles
create— Creates an InboundSamlSsoProfile for a customer. When the target customer has enabled Multi-party approval for sensitive actions, theOperationin the response will have"done": false, it will not have a response, and the metadata will have"state": "awaiting-multi-party-approval".delete— Deletes an InboundSamlSsoProfile.get— Gets an InboundSamlSsoProfile.list— Lists InboundSamlSsoProfiles for a customer.patch— Updates an InboundSamlSsoProfile. When the target customer has enabled Multi-party approval for sensitive actions, theOperationin the response will have"done": false, it will not have a response, and the metadata will have"state": "awaiting-multi-party-approval".idpCredentials— Operations on the 'idpCredentials' resource
inboundSsoAssignments
create— Creates an InboundSsoAssignment for users and devices in aCustomerunder a givenGrouporOrgUnit.delete— Deletes an InboundSsoAssignment. To disable SSO, Create (or Update) an assignment that hassso_mode==SSO_OFF.get— Gets an InboundSsoAssignment.list— Lists the InboundSsoAssignments for aCustomer.patch— Updates an InboundSsoAssignment. The body of this request is theinbound_sso_assignmentfield and theupdate_maskis relative to that. For example: a PATCH to/v1/inboundSsoAssignments/0abcdefg1234567&update_mask=rankwith a body of{ "rank": 1 }moves that (presumably group-targeted) SSO assignment to the highest priority and shifts any other group-targeted assignments down in priority.
policies
get— Get a policy.list— List policies.
Discovering Commands
Before calling any API method, inspect it:
# Browse resources and methods
gws cloudidentity --help
# Inspect a method's required params, types, and defaults
gws schema cloudidentity.<resource>.<method>
Use gws schema output to build your --params and --json flags.
Comments
Loading comments...
