deployment-manager
Analysis
This instruction-only deployment skill is mostly coherent, but some examples could change live production systems if copied or followed without stronger approval and scope safeguards.
Findings (6)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
on:
push:
branches: [main]
...
kubectl set image deployment/app-green app=app:${{ github.sha }}
...
kubectl patch service app-service -pThe example CI workflow deploys and switches Kubernetes service traffic automatically on a push to main, with no explicit manual approval, namespace/cluster allowlist, dry-run, or rollback decision gate shown.
- uses: actions/checkout@v3
The GitHub Actions example pins a third-party action only to a major version tag rather than an immutable commit, which is common but leaves update/provenance risk if copied into a real pipeline.
run: |
docker build -t app:${{ github.sha }} .
docker run --rm app:${{ github.sha }} npm testThe skill provides shell/CI examples that build and run containers. This is expected for deployment guidance, but it is executable automation that users should review before adopting.
- name: Switch Traffic
run: |
kubectl patch service app-service -p
- name: Cleanup Blue Environment
run: |
kubectl set image deployment/app-blue app=app:${{ github.sha }}The example switches service traffic and then updates the blue environment, which can propagate a bad release broadly and reduce immediate rollback separation if not gated and contained.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
kubectl rollout undo deployment/$service_name
Rollback operations require Kubernetes privileges over deployments; this is aligned with deployment management, but users should notice that the skill's examples assume sensitive operational authority.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
send_slack_notification "✅ Rollback completed for $service_name" send_alert "🚨 Rollback failed for $service_name"
The rollback example implies external notification integrations. This is normal for deployments, but recipient, workspace, authentication, and data-sharing boundaries are not specified.
