Proxmox Full

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the token belongs to a highly privileged Proxmox user, the agent could control large parts of the cluster, including starting, stopping, creating, cloning, or modifying workloads.

Why it was flagged

The setup explicitly tells users to disable Proxmox token privilege separation, which can make the token inherit the full permissions of the owning account instead of being narrowly scoped.

Skill content
**Create API token:** Datacenter → Permissions → API Tokens → Add (uncheck Privilege Separation)
Recommendation

Use a dedicated Proxmox user or token with the minimum required roles, keep privilege separation enabled where possible, and restrict permissions to specific nodes, storage, pools, or VM IDs.

What this means

A mistaken or ambiguous request could stop production VMs or remove recovery points, causing outages or making rollback harder.

Why it was flagged

The skill documents direct high-impact API operations, including immediate VM stops and snapshot deletion, with no visible confirmation requirement, safety check, or scoped workflow.

Skill content
# Stop (immediate)
curl -sk -X POST -H "$AUTH" "$PVE_URL/api2/json/nodes/{node}/qemu/{vmid}/status/stop"
...
# Delete snapshot
curl -sk -X DELETE -H "$AUTH" "$PVE_URL/api2/json/nodes/{node}/qemu/{vmid}/snapshot/{snapname}"
Recommendation

Require explicit user confirmation before destructive or availability-impacting actions, verify node and VM IDs, and prefer safer workflows such as listing targets before mutating them.

What this means

On an untrusted network or with a spoofed endpoint, the privileged Proxmox token could be exposed to an attacker.

Why it was flagged

The examples send the Proxmox API token in an Authorization header while using curl's -k option, which disables TLS certificate verification.

Skill content
AUTH="Authorization: PVEAPIToken=$PVE_TOKEN"
...
curl -sk -H "$AUTH" "$PVE_URL/api2/json/cluster/status" | jq
Recommendation

Avoid -k when possible; configure trusted Proxmox certificates or a pinned CA, and only connect to verified PVE_URL endpoints.

What this means

If copied directly, a new container could be created with an easily guessed password.

Why it was flagged

The LXC creation example includes a weak sample root password and starts the container immediately.

Skill content
-d "password=changeme123" \
  -d "start=1"
Recommendation

Replace sample passwords with unique secrets, prefer SSH keys, and avoid automatically starting newly created containers until access controls are verified.