Cloudways Integration

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This documentation-only Cloudways guide is coherent and transparent, but it describes admin workflows that handle real credentials and database changes.

This skill itself is documentation-only and does not install code, but the Cloudways feature it describes is for trusted operators. Before using it with real sites, review the actual OpenClaw Cloudways source files, confirm secrets stay in the vault, use placeholders in shared materials, and treat database write queries as production-impacting actions.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If used with real accounts, the integration can access Cloudways inventory, servers, WordPress admin areas, and databases.

Why it was flagged

The skill clearly documents handling Cloudways account credentials plus server, WordPress, and database secrets, which are powerful credentials but aligned with the Cloudways integration purpose.

Skill content
- storing Cloudways account auth in the vault
- storing server-level master SSH/SFTP credentials
- storing app-level SSH, WordPress admin, and DB access secrets
Recommendation

Use least-privilege Cloudways and server credentials, confirm vault storage behavior in the actual implementation, and never package live secrets or configs.

What this means

A confirmed write query could change or delete WordPress production data if used incorrectly.

Why it was flagged

The documented integration can execute database write operations, but the artifacts also describe restrictions, confirmation, dry-run behavior, and audit logging.

Skill content
Allowed write statements
- `INSERT`
- `UPDATE`
- `DELETE`
- `REPLACE`
...
exact confirmation text: `RUN WRITE QUERY`
...
write attempts are audit logged locally
Recommendation

Only let trusted operators run write queries, review SQL carefully, keep backups, and verify the actual gateway implementation enforces these guardrails.

What this means

Running the actual integration may launch browser automation and network SSH/DB tests against configured Cloudways resources.

Why it was flagged

The guide documents browser automation and SSH-testing helpers in the referenced integration; this is expected for DB/SSH access checks but should be understood before use.

Skill content
- DB Manager automation uses Playwright Chromium
- SSH testing uses Python + Paramiko
Recommendation

Use the automation only for intended Cloudways targets and verify dependencies and prompts in the actual implementation before running tests.

What this means

A user or agent may not have that local file, and safety/behavior details in external code or local references are not reviewed here.

Why it was flagged

The documentation references a local developer path outside this skill package, so that supporting material is not verifiable from the provided artifacts.

Skill content
The OpenClaw workspace already keeps a local Cloudways API reference copy at:
`/home/charl/.openclaw/workspace/skills/cloudways-wordpress-review/references/cloudways-api.md`
Recommendation

Rely on repository-tracked source files and official Cloudways documentation instead of personal local paths, and review the actual built-in integration code before relying on it.