agent-bom discover gcp
Analysis
This appears to be a disclosed, read-only GCP inventory skill, but users should use scoped GCP credentials and install the referenced agent-bom tool only from a trusted source.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Requires Python 3.11+, agent-bom installed from this repository or PyPI
The skill is instruction-only and relies on an external agent-bom package/helper for execution. That is aligned with the purpose, but the reviewed artifact does not pin a package hash or include the helper code.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
file_reads: - "~/.config/gcloud/application_default_credentials.json" - "~/.config/gcloud/credentials.db" - "operator-selected service account JSON when GOOGLE_APPLICATION_CREDENTIALS is set"
The skill may use local GCP credential/profile files to authenticate discovery. This is expected for GCP inventory and the skill says to use read-only credentials, but those credentials can expose all resources within their granted scope.
