Server

PassAudited by ClawScan on May 1, 2026.

Overview

This instruction-only server administration skill matches its stated purpose, but users should review its examples because they can create persistent services, use privileged Docker access, and include an insecure Traefik API option.

Use this skill only on servers or local environments you intend to administer. Review commands before running them, remove or secure Traefik's insecure API setting, replace placeholder passwords, and be careful before enabling persistent services or removing Docker volumes.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If copied as-is in the wrong environment, this could expose Traefik administrative or routing information to other reachable services or users.

Why it was flagged

The Traefik example enables the unauthenticated API/dashboard. It is explicit and related to reverse-proxy setup, but can be unsafe if reused in a reachable production environment.

Skill content
- "--api.insecure=true"
Recommendation

Remove `--api.insecure=true` for production, or expose the dashboard only behind authentication and trusted network controls.

What this means

A compromised or misconfigured container with Docker socket access may reveal container metadata or increase impact on the host environment.

Why it was flagged

Mounting the Docker socket lets Traefik inspect Docker state for service discovery. This is a common Traefik pattern, but it expands the container's visibility and privilege boundary.

Skill content
- /var/run/docker.sock:/var/run/docker.sock:ro
Recommendation

Use the Docker socket only when needed, keep Traefik tightly controlled, consider a restricted Docker socket proxy, and avoid exposing the Traefik dashboard/API.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

Services created from these examples may keep running after the immediate task and may restart automatically.

Why it was flagged

The instructions show enabling and starting a systemd service so it persists across reboots. That is expected for server deployment and is disclosed, but it changes long-running host state.

Skill content
After creating: `systemctl daemon-reload && systemctl enable myapp && systemctl start myapp`
Recommendation

Confirm service names, users, working directories, and restart policies before enabling services, and document how to stop or disable them.