netmiko ssh

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

This SSH skill is not clearly malicious, but it gives an agent broad remote SSH command access using your passwords and stores command/session history without clear safeguards.

Install only if you intentionally want the agent to administer SSH targets. Verify the MCP server and mcp2skill source first, use temporary least-privilege credentials, manually approve each command, avoid production passwords until credential handling is clear, and confirm how session and command history can be reviewed and deleted.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A mistaken or overly autonomous tool call could change, disrupt, or expose data on network devices or servers reachable by SSH.

Why it was flagged

The skill exposes a raw SSH command tool that can run arbitrary commands on remote systems using supplied credentials. The artifacts do not document command allowlists, target restrictions, human approval requirements, or containment.

Skill content
execute_ssh_command: Executa um comando SSH em um dispositivo remoto. Args: command: O comando a ser executado... host... username... password...
Recommendation

Use only with explicit user-reviewed commands and least-privilege SSH accounts. Add or require confirmations, target scoping, command allowlists, and safe rollback procedures before production use.

ConcernMedium Confidence
ASI03: Identity and Privilege Abuse
What this means

Providing a production SSH password could let the MCP server or agent act with that account’s authority, and the artifacts do not show how the password is protected.

Why it was flagged

Creating a session requires SSH credentials and grants whatever remote privileges that account has. The registry metadata declares no primary credential, and the artifacts do not explain credential storage, redaction, or lifetime.

Skill content
### create_ssh_session ... "required": ["host", "username", "password", "session_id"]
Recommendation

Do not provide high-privilege or shared SSH passwords unless you trust and have verified the MCP server. Prefer temporary, least-privilege credentials and document credential handling in the skill metadata.

ConcernMedium Confidence
ASI06: Memory and Context Poisoning
What this means

SSH targets, usernames, operational commands, or secrets typed into commands could remain available in history after the task ends.

Why it was flagged

The skill discloses persistent session history in a database and command history lookup, but does not describe retention, deletion, access controls, or secret redaction.

Skill content
list_history_sessions: Lista o histórico de todas as sessões registradas no banco de dados. Inclui sessões ativas e encerradas. ... list_history_commands: Lista o histórico de comandos executados
Recommendation

Verify where the database is stored, who can access it, how long history is retained, and how to clear it. Avoid entering secrets in commands unless logging is disabled or redacted.

What this means

Your safety depends partly on the external mcp2skill tool and MCP server implementation, which are not reviewed in these artifacts.

Why it was flagged

The skill depends on an external globally installed helper and an update command, but the supplied artifacts do not pin a version or include the helper/server code for review. The commands are user-directed, so this is a supply-chain note rather than proof of malicious behavior.

Skill content
This skill requires `mcp2skill` to be installed globally ... install it from https://github.com/fenwei-dev/mcp2skill ... `mcp2skill update-skill --skill <skill-dir>`
Recommendation

Install helper tools only from trusted sources, pin versions where possible, review update changes before applying them, and verify the MCP server implementation separately.