Railway
Analysis
This appears to be a legitimate Railway CLI helper, but it deserves review because it can deploy, modify, or delete cloud resources and use Railway account credentials.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
railway up --environment production ... railway service delete <SERVICE_NAME> ... railway environment delete <ENV_NAME> ... railway volume delete <VOLUME_ID>
These commands can deploy to production and delete Railway services, environments, and volumes. That is aligned with the skill purpose, but it is high-impact account mutation without explicit confirmation or scope limits in the instructions.
railway run <command> ... railway run python manage.py migrate ... railway run prisma db push ... railway ssh
The skill documents running commands with Railway environment variables and opening SSH sessions. This is relevant to deployment operations, but it can execute commands that affect application state or production databases.
"kind": "npm", "package": "@railway/cli"
The skill offers a package-manager install path for the Railway CLI. This is expected for a CLI-based skill, but it relies on the external package source and is not pinned in the artifact.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
railway login --token <TOKEN> ... RAILWAY_TOKEN: ${{ secrets.RAILWAY_TOKEN }}The skill expects Railway account authentication via login or token. This is normal for Railway management, but the token may grant significant cloud-account authority.
