incident-responder
Analysis
This incident-response skill is relevant to its purpose, but it includes examples that can use production SSH/Kubernetes privileges and automatically make operational changes without clear approval safeguards.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
def auto_remediate(self, diagnostics: Dict) -> List[str]: ... subprocess.run(["sync"], check=True) ... subprocess.run(["echo", "3", ">", "/proc/sys/vm/drop_caches"], shell=True) ... subprocess.run(["journalctl", "--vacuum-time=7d"], check=True) ... actions = responder.auto_remediate(diagnostics)
The example shows an automated remediation workflow that performs host-level changes and log cleanup based on diagnostics, then calls that remediation path directly, without an explicit approval or dry-run step.
kubectl run debug --image=nicolaka/netshoot -it --rm
The Kubernetes debugging guidance runs an external container image by tag rather than an approved or digest-pinned image.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
-l "ssh server1 'tail -f /var/log/app.log'" ... kubectl exec -it $POD_NAME -- /bin/bash ... kubectl rollout undo deployment/$DEPLOYMENT --to-revision=2
The skill documents use of existing SSH and Kubernetes authority, including interactive pod access and deployment rollback, while the registry metadata declares no credentials, config paths, or scope limits.
