CI Whisperer

PassAudited by ClawScan on May 1, 2026.

Overview

CI Whisperer is a coherent GitHub Actions troubleshooting skill, but it uses your authenticated GitHub CLI and has an opt-in mode that can create branches or PRs.

This looks safe for its intended CI troubleshooting purpose. Before installing, be comfortable with it using your local GitHub CLI account to read run logs. Keep CI_WHISPERER_WRITE unset unless you explicitly want it to create a fix PR, and use a trusted or isolated checkout before allowing it to run local tests.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The installer may not warn users that the skill depends on a local authenticated GitHub CLI session.

Why it was flagged

The registry metadata does not surface the GitHub CLI, GitHub authentication, or optional write-toggle setup described in the skill docs. This appears to be a setup transparency issue rather than hidden behavior.

Skill content
Required binaries (all must exist): none ... Env var declarations: none ... Primary credential: none
Recommendation

Declare the GitHub CLI and optional CI_WHISPERER_WRITE toggle in metadata if supported, and users should verify which GitHub account gh is authenticated as.

What this means

Actions are performed with whatever repository access the local GitHub CLI account has.

Why it was flagged

The skill uses the user's authenticated GitHub CLI identity to access run metadata and logs, and possibly to create PRs in opt-in write mode.

Skill content
If `gh` is not authenticated, stop and ask the user to run: `/usr/bin/gh auth login`
Recommendation

Use a GitHub account/token with only the access needed for the target repository, and confirm the active gh account before use.

What this means

Private build output or accidental secrets in CI logs may be processed by the agent and could be quoted if not redacted carefully.

Why it was flagged

The skill intentionally brings CI logs into the agent context. Logs can contain secrets or untrusted text, although the skill instructs redaction before quoting.

Skill content
`gh run view <run-id> --repo owner/repo --log-failed` ... `the exact error excerpt (short; redact secrets)`
Recommendation

Prefer failed logs over full logs, review excerpts before sharing externally, and avoid using the skill on logs known to contain secrets.

What this means

If write mode is enabled, the agent may create branches, edit files, and open PRs in the target repository.

Why it was flagged

PR fix mode can mutate repository state, but the instructions require both explicit user approval and a local write-mode toggle.

Skill content
If the user asks to fix it and `CI_WHISPERER_WRITE=1`: - create a branch - apply minimal changes - run local lint/tests if available - open PR
Recommendation

Leave CI_WHISPERER_WRITE unset unless you intend to allow PR creation, and review any diff and PR text before relying on it.

What this means

On an untrusted repository, local test or lint scripts could run code on the user's machine.

Why it was flagged

Running project lint or test commands can execute repository code. This is purpose-aligned for validating CI fixes and is limited to opt-in PR fix mode.

Skill content
run local lint/tests if available
Recommendation

Run PR fix mode only in trusted repositories or an isolated environment, especially before executing project test scripts.