VCF Green IT & Carbon Footprint

v1.0.1

An MCP server that interfaces with VMware Aria Operations to extract Green IT metrics, carbon footprint data, and the organizational Green Score for ESG repo...

0· 73·0 current·0 all-time
byRohit Kasture@kasture-rohit
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description ask for Aria Operations sustainability data and the skill requires ARIA_OPS_HOST and ARIA_OPS_API_TOKEN and contains code that calls the Aria suite-api—these requirements are proportional and expected.
Instruction Scope
SKILL.md only instructs installing Python deps and launching the provided MCP server with the two Aria env vars. It does not ask to read unrelated files or other credentials. Note: the server will return whatever data the Aria Ops endpoint provides, so sensitive inventory/metrics from Aria may be surfaced to the agent.
Install Mechanism
No install spec; it is instruction-only with a requirements.txt for pip. This is low-risk and expected for a Python MCP server.
Credentials
Only ARIA_OPS_HOST and ARIA_OPS_API_TOKEN are required, which matches the stated purpose. Caution: the SKILL.md example places the token directly in the agent MCP config (plaintext in env), which may expose the token to logs or other processes—use a secure secret store or restricted environment.
Persistence & Privilege
always is false and the skill is user-invocable. The MCP server runs when configured by the user; it does not request system-wide modifications or permanent platform-level privileges.
Assessment
This skill is coherent with its stated purpose, but review these practical risks before enabling it: - Protect the API token: avoid placing ARIA_OPS_API_TOKEN as plaintext in shared config or logs; use a secure secret store or scoped service account with least privilege. - TLS verification: the code disables SSL verification (verify=False) and suppresses warnings—this weakens transport security and could allow MITM. If your Aria Ops has a valid certificate, modify the code to enable verification; if using self-signed certs, add the CA instead of disabling verification. - Data exposure: the tool returns whatever the Aria endpoint provides. Ensure you are comfortable with the agent receiving those metrics and any underlying resource identifiers. - Run in a controlled environment: host the MCP server on a trusted machine/network and restrict outbound access to the ARIA_OPS_HOST only. - Audit and rotate credentials: monitor usage of the API token and rotate/revoke if needed. Review the mcp and requests dependencies for supply-chain concerns. If you need the skill to be stricter about TLS or token handling, ask the maintainer to (1) remove verify=False or accept a CA file, and (2) support reading the token from a secure vault instead of env var plaintext.

Like a lobster shell, security has layers — review code before you run it.

aria-operationsvk974y3rhd7bc0qj80aer4vftw1849y46esgvk974y3rhd7bc0qj80aer4vftw1849y46green-scorevk974y3rhd7bc0qj80aer4vftw1849y46latestvk97dpa1s64qhpw82ege70apb7n849p0vmcpvk974y3rhd7bc0qj80aer4vftw1849y46sustainabilityvk974y3rhd7bc0qj80aer4vftw1849y46vcfvk974y3rhd7bc0qj80aer4vftw1849y46vmwarevk974y3rhd7bc0qj80aer4vftw1849y46

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

EnvARIA_OPS_HOST, ARIA_OPS_API_TOKEN

Comments