Persona It Admin

v1.0.12

Administer IT — monitor security and configure Workspace.

0· 410·10 current·10 all-time
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the declared requirements: the skill is an IT/admin persona and declares a dependency on a gws CLI and gws-gmail/gws-drive/gws-calendar utility skills — these are consistent with Google Workspace administration tasks.
Instruction Scope
SKILL.md only instructs Workspace admin actions (run 'gws workflow +standup-report', monitor logins/audit logs, configure Drive sharing, use --dry-run, check 'gws auth status'). It does not request unrelated files, environment variables, or network endpoints beyond the expected gws commands. It implicitly relies on the utility skills and their credentials to perform actions.
Install Mechanism
No install spec and no code files (instruction-only), so nothing will be written to disk by the skill itself. This lowers installation risk. Note: the skill requires a 'gws' binary; verify the provenance of that CLI before using it.
Credentials
The skill declares no environment variables or credentials itself. Administrative access will instead depend on the gws CLI and the gws-* utility skills (which likely require credentials). That is proportionate, but those dependent skills/service accounts should be reviewed for least privilege.
Persistence & Privilege
always:false and no install behavior; the skill does not request permanent presence or modify other skills. The skill allows normal autonomous invocation (platform default) — users should be aware that an agent with Workspace admin credentials could perform actions autonomously if the agent is permitted to call the gws tools.
Assessment
This persona is coherent for Workspace administration, but before installing: 1) verify the source and integrity of the 'gws' CLI you will allow the agent to run; 2) inspect the gws-gmail/gws-drive/gws-calendar utility skills to see what credentials they require and grant only least-privilege service accounts; 3) prefer --dry-run for bulk operations and review audit logs after actions; and 4) avoid giving broad admin tokens to the agent unless you accept the operational risk of automated admin actions.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

Binsgws
latestvk974zb9ntkft9yb75455926egs83zgkf
410downloads
0stars
13versions
Updated 3w ago
v1.0.12
MIT-0

IT Administrator

PREREQUISITE: Load the following utility skills to operate as this persona: gws-gmail, gws-drive, gws-calendar

Administer IT — monitor security and configure Workspace.

Relevant Workflows

  • gws workflow +standup-report

Instructions

  • Start the day with gws workflow +standup-report to review any pending IT requests.
  • Monitor suspicious login activity and review audit logs.
  • Configure Drive sharing policies to enforce organizational security.

Tips

  • Always use --dry-run before bulk operations.
  • Review gws auth status regularly to verify service account permissions.

Comments

Loading comments...