Aws Fis Experiment Execute

WarnAudited by ClawScan on May 10, 2026.

Overview

The skill is transparent about running AWS chaos experiments, but it deserves review because it can disrupt cloud resources and broadly scans or logs all accessible EKS clusters, including sensitive Kubernetes data.

Install only if you intend to run controlled AWS FIS chaos experiments. Use a tightly scoped AWS profile and kubeconfig, verify the template/actions/stop conditions before confirming, and limit or disable broad EKS discovery and log collection unless you are comfortable with Secrets and application logs being inspected.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the wrong account, region, template, or stop condition is used, the experiment could disrupt production services.

Why it was flagged

The skill intentionally invokes AWS FIS, which can disrupt real infrastructure. The artifacts also disclose safety checks and require explicit confirmation, so this is purpose-aligned but high-impact.

Skill content
FIS experiments affect **real production resources**. Starting without proper confirmation, impact review, or stop conditions risks unintended damage. ... **Starts the experiment** only after explicit user confirmation.
Recommendation

Before confirming, verify the AWS account, region, template ID, action list, affected resources, duration, and stop conditions; run with a least-privilege role.

What this means

The agent may enumerate and inspect unrelated clusters or workloads if the AWS/kubectl identity has broad access.

Why it was flagged

The instructions expand from the prepared experiment to every EKS cluster the current credentials can access in the region, which is broader than a specific experiment target.

Skill content
loads `app-service-log-analysis` skill to discover ALL EKS clusters in the target region ... deep-scans all accessible clusters in parallel
Recommendation

Use a dedicated, least-privilege AWS profile and kubeconfig limited to the intended cluster(s); require explicit user selection before scanning clusters or namespaces.

What this means

Sensitive values, credentials, customer data, or operational logs could be collected into reports or raw log files.

Why it was flagged

The skill directs the agent to read Kubernetes Secrets, configuration, environment data, and live application logs across accessible clusters, but the artifacts do not define redaction, retention, or narrow scope controls.

Skill content
deep-scans all accessible clusters in parallel for application dependencies (env vars, ConfigMaps, Secrets, ExternalName, etc.), and starts background `kubectl logs -f` **before the experiment starts**
Recommendation

Exclude Kubernetes Secrets by default, redact logs, define retention and storage locations, and require opt-in for each cluster/namespace and log source.

What this means

Actual data collection behavior depends partly on a separate skill that must be trusted and reviewed independently.

Why it was flagged

A separate skill, not included in the provided artifact contents, performs important discovery and log-analysis behavior.

Skill content
**REQUIRED SUB-SKILL:** `app-service-log-analysis` must be installed. Loaded at runtime for application discovery, log collection, and analysis.
Recommendation

Install `app-service-log-analysis` only from a trusted source and review its permissions, log handling, and cleanup behavior before using this skill.

What this means

If the session crashes or is interrupted, log-following processes could continue longer than intended.

Why it was flagged

The background log collection is disclosed and purpose-aligned, but it creates long-running processes that should be bounded and cleaned up.

Skill content
starts background `kubectl logs -f` **before the experiment starts**
Recommendation

Confirm the skill records process IDs, stops collectors on abort or completion, and provides cleanup commands for interrupted runs.