MLOps Automation

PassAudited by ClawScan on May 1, 2026.

Overview

This appears to be a benign MLOps template skill; the main things to review are the CI workflow's external actions/Codecov upload and the missing referenced justfile/Dockerfile templates.

Before installing, review the CI workflow, decide whether Codecov uploads are acceptable, consider pinning external GitHub Actions, and make sure any missing justfile or Dockerfile templates are supplied from a trusted source.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Setup may fail, or a user/agent may be tempted to obtain or create missing templates from another source.

Why it was flagged

The skill directs users to copy justfile and Dockerfile templates, but those files are not included in the provided manifest. This is a packaging/provenance gap rather than evidence of malicious behavior.

Skill content
cp references/justfile ./ ... cp references/Dockerfile ./
Recommendation

Verify the package contents before use and only add reviewed justfile/Dockerfile templates to a project.

What this means

If an external action tag changes or is compromised, the repository's CI could run changed third-party code.

Why it was flagged

The CI workflow relies on external GitHub Actions by version tag rather than immutable commit SHA. This is common and purpose-aligned for CI/CD, but upstream action changes would affect future CI runs.

Skill content
uses: astral-sh/setup-uv@v4
Recommendation

For sensitive repositories, review the actions used and consider pinning third-party actions to specific commit SHAs.

What this means

Running these commands in an untrusted project could execute that project's tests, build scripts, or Dockerfile instructions.

Why it was flagged

The quick start instructs running task-runner and Docker build commands in the user's project. This is central to the skill's stated MLOps purpose and appears user-directed, but it does execute local project/build logic.

Skill content
just check
docker build -t test .
Recommendation

Run the setup and build commands only in repositories you trust or after reviewing the project scripts and Dockerfile.

What this means

Coverage metadata from the repository would be shared with Codecov when the workflow runs.

Why it was flagged

The workflow uploads the generated coverage.xml file to Codecov. This is disclosed and normal for coverage reporting, but it sends a CI artifact to an external provider.

Skill content
uses: codecov/codecov-action@v4 ... file: ./coverage.xml
Recommendation

Use Codecov only if that sharing is acceptable for the repository, and configure tokens/privacy settings as needed.