agent-bom discover snowflake
Analysis
The skill is a coherent Snowflake inventory helper, but it intentionally uses Snowflake authentication and external agent-bom tooling, so run it only with verified sources and least-privileged read-only access.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Default to discover-only: write JSON to an operator-selected path and stop. ... python examples/operator_pull/snowflake_inventory_adapter.py ... --output snowflake-inventory.json
The workflow asks the user to run local command-line tooling that connects to Snowflake and writes an inventory file; this is central to the skill's purpose and is constrained as discover-only.
Requires Python 3.11+, agent-bom installed with the snowflake extra ... python examples/operator_pull/snowflake_inventory_adapter.py
The instruction-only skill depends on an external agent-bom installation and example adapter script rather than bundled reviewed code.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
credentials: snowflake-read-only ... optional_env: ... SNOWFLAKE_PRIVATE_KEY_PATH ... SNOWFLAKE_TOKEN ... credential_policy: "Use the operator's existing Snowflake SSO, OAuth, or key-pair auth context... Do not ask users to paste passwords, private keys, or OAuth tokens into chat."
The skill explicitly relies on the operator's Snowflake authentication context, including potentially sensitive OAuth tokens or key-pair material, but frames it as read-only and tells the agent not to collect secrets in chat.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
data_flow: "Operator Snowflake account -> read-only Snowflake queries/API calls -> canonical inventory JSON -> optional local agent-bom inventory scan... Credential-like values are redacted before persistence/export."
The skill persists Snowflake-derived inventory context to local JSON for later scanning; it says credentials are redacted, but the inventory itself can still be sensitive.
