Consul CLI

v1.0.0

Consul CLI command reference for service discovery, key-value store, health checks, cluster management, and service mesh operations. Use when executing Consu...

0· 57·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The skill is purely a CLI reference for HashiCorp Consul and contains example commands, env var names, and file paths appropriate to that purpose. One minor inconsistency: it does not declare the 'consul' binary as a required binary even though the guidance is explicitly about running consul commands.
Instruction Scope
SKILL.md and the reference file provide command examples and describe environment variables and paths (e.g., CONSUL_HTTP_TOKEN, /etc/consul.d, backup.snap). These are presented as examples/documentation and do not instruct the agent to read or exfiltrate unrelated files or secrets.
Install Mechanism
No install spec and no code files are present (instruction-only). This is the lowest-risk install profile — nothing will be written or executed by the skill itself.
Credentials
The documentation references sensitive env vars (CONSUL_HTTP_TOKEN, CONSUL_HTTP_TOKEN_FILE, TLS cert/key paths) that are normal for Consul use. The skill does not request or require those values from the environment, which is proportionate, but users should be aware commands shown could be used with real tokens/paths and thus could act on sensitive data if executed.
Persistence & Privilege
always:false (default) and there is no install or configuration modification. The skill does not request persistent privileges or system-wide changes.
Assessment
This skill is a documentation-only Consul CLI reference and appears coherent. Before using it: (1) ensure the 'consul' binary is present and you understand the effects of commands you run (ACL, snapshot restore, force-leave, etc. can be destructive); (2) never paste real tokens or secrets into public prompts — the docs reference CONSUL_HTTP_TOKEN and token-management commands which are sensitive; (3) because the skill source is unknown, treat it as read-only documentation rather than an automated tool — if you permit the agent to execute commands, restrict or review those actions first.

Like a lobster shell, security has layers — review code before you run it.

latestvk9741hk4krvpvqbkjvmsx0rhes83q5px

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments