Consul API
v1.0.0Consul HTTP API operations for service discovery, key-value store, health checks, and service mesh management. Use when working with Consul clusters for: (1)...
⭐ 0· 56·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description match the content: the SKILL.md and api-reference provide Consul HTTP API endpoints and examples. There are no unrelated environment variables, binaries, or installs requested that would be unexpected for a Consul API helper.
Instruction Scope
The instructions are a reference/specification and only show example HTTP endpoints and curl headers (X-Consul-Token / Authorization). They do not direct the agent to read local files, access unrelated services, or exfiltrate data. The doc includes administrative endpoints (ACL, bootstrap, deregister) which are legitimately part of Consul's API.
Install Mechanism
No install spec and no code files — this is instruction-only, so nothing will be fetched or written to disk during install. Lowest-risk install posture.
Credentials
The skill declares no required environment variables or credentials. The documentation shows how Consul tokens are used (X-Consul-Token / Bearer) but does not request or store any credentials itself. This is proportionate for an API reference.
Persistence & Privilege
always:false and no install actions; the skill does not request persistent privileges or modify other skills. Autonomous invocation is allowed (platform default) but is not combined with any other elevated privileges here.
Assessment
This is a documentation-only skill describing the Consul HTTP API. It is internally consistent, but note: many of the shown endpoints (ACL bootstrap, token creation, service deregistration) are powerful and require appropriate Consul tokens — only provide such tokens to trusted code or users. The skill itself does not request credentials, so if you plan to use it interactively or have an agent perform calls, ensure the agent is only given least-privilege Consul tokens and that network access is limited to the intended Consul cluster (avoid exposing tokens to untrusted networks or agents).Like a lobster shell, security has layers — review code before you run it.
latestvk97crrd6mz3g1rt5390s1k7nth83pq5x
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
