Watadot Aws Cloudwatch

PassAudited by ClawScan on May 10, 2026.

Overview

This skill coherently documents AWS CloudWatch read commands, but users should ensure it runs only with an appropriately scoped AWS profile because logs and metrics may be sensitive.

Before installing, confirm you want the agent to help run AWS CloudWatch read commands. Use a least-privilege AWS profile, specify the intended region and log groups, and remember that CloudWatch logs may contain sensitive data.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If invoked with a broad AWS profile, the agent could view CloudWatch logs, alarms, metrics, and dashboard names available to that identity.

Why it was flagged

The skill uses the AWS CLI to access CloudWatch logs and metrics, which will operate under the user's configured AWS identity. This is purpose-aligned, but the artifacts do not specify a profile, account, region, or least-privilege role.

Skill content
requires:\n      anyBins: [aws]\n...\naws logs tail /aws/lambda/<function-name> --follow\n...\naws logs filter-log-events --log-group-name <name> --filter-pattern "ERROR"
Recommendation

Use an explicit read-only AWS profile or role limited to the intended account, region, and log groups; add `--profile` and `--region` when running commands.

What this means

A log-tail session could continue showing new CloudWatch log entries while it remains active.

Why it was flagged

The skill documents a raw AWS CLI log-tail command. This is central to the stated log monitoring purpose, but `--follow` will keep streaming until stopped.

Skill content
aws logs tail /aws/lambda/<function-name> --follow
Recommendation

Run tailing only for the intended log group and stop the command once troubleshooting is complete.