Multi Site Health Monitor
Analysis
This monitoring skill is useful for uptime checks, but it can automate production-impacting restarts, rollbacks, cloud actions, SSH commands, and external alerts without clearly bounded approval controls.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
**Webhook Triggers**: POST to custom endpoints (restart services, scale infrastructure) ... **Service Restart**: Execute shell commands on remote servers via SSH ... **Rollback Triggers**: Revert deployments if health checks fail
The skill exposes mutating production operations as automated monitoring responses, including webhook-triggered restarts, infrastructure scaling, remote shell commands, and deployment rollbacks.
If it fails 3 times in a row: 1. POST to https://restart-api.example.com/restart-payment-service 2. Alert PagerDuty ... 4. Log to Google Sheets with timestamp, error details, restart status
The example chains a health-check failure into restart automation, incident escalation, notification, and external logging.
automates continuous monitoring of 10-100+ websites ... Monitor https://payment-service.example.com/health every 2 minutes
The skill is intended to run recurring monitoring and automated escalation, but the provided instructions do not clearly specify duration, stop conditions, or lifecycle ownership.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
requires":{"env":["SLACK_WEBHOOK_URL","PAGERDUTY_API_KEY","DATADOG_API_KEY"]} ... **AWS/Azure**: Auto-restart EC2 instances, trigger Lambda functions, scale infrastructureThe skill declares alerting credentials and also describes privileged cloud and infrastructure actions, but the provided artifacts do not clearly define least-privilege scopes or how higher-impact credentials should be constrained.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Route critical issues to PagerDuty, warnings to Slack, metrics to Datadog ... Log to Google Sheets with timestamp, error details, restart status
The skill intentionally sends monitoring data, alerts, metrics, and error details to third-party services, which is purpose-aligned but may expose internal URLs or operational details.
