Alibabacloud Alert Intent Router

ReviewAudited by ClawScan on May 10, 2026.

Overview

This skill is a transparent Alibaba Cloud alert router, but it relies on cloud read permissions, local CMDB data, and separate diagnostic skills that users should verify.

Before installing, confirm that the three backend Alibaba Cloud diagnostic skills are trusted, configure only least-privilege read permissions for this router, protect the CMDB and intent-mapping files from untrusted edits, and review any generated remediation commands before running them.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The skill may use an Alibaba Cloud profile or role to see ECS and VPC resource metadata across the account.

Why it was flagged

The router expects Alibaba Cloud account authority for resource discovery. The documented permissions are read-only and purpose-aligned, but they can read cloud inventory broadly.

Skill content
本技能为**纯路由技能**,仅需要只读权限用于资源查询和信息收集 ... "Resource": "*"
Recommendation

Use a dedicated least-privilege RAM role/profile for this router and separately review the permissions required by each backend diagnostic skill.

What this means

Alert contents, instance IDs, region IDs, and diagnosis context may be shared with backend diagnostic skills.

Why it was flagged

The skill is designed to pass alert details and cloud resource identifiers to other installed skills. This is disclosed and central to the purpose, but data and permissions cross a skill boundary.

Skill content
必须使用 **Skill 工具** 调用后端技能:
Skill(skill: "<backend_skill_name>", args: "<传递给后端技能的参数>")
Recommendation

Install only trusted backend skills, verify their publishers and permissions, and avoid sending sensitive alert text unless those backend skills are approved.

What this means

The CMDB can contain sensitive infrastructure mappings, and incorrect or untrusted edits could cause wrong routing or misleading reports.

Why it was flagged

The optional CMDB file is persistent local context used to resolve resource names and relationships for routing and reports.

Skill content
配置 CMDB 可以提供以下增强功能:- 业务名称到资源 ID 的映射 ... - 资源关联关系 ... - 自定义业务标签和分组
Recommendation

Restrict who can edit the CMDB and intent-mapping reference files, and review their contents before relying on automated diagnosis.

What this means

A user following the guide installs an external command-line tool that can later access Alibaba Cloud APIs using configured credentials.

Why it was flagged

The reference guide tells users how to install a latest Aliyun CLI binary into PATH. This is user-directed setup, not automatic execution, but it is not pinned or checksum-verified in the artifact.

Skill content
wget https://aliyuncli.alicdn.com/aliyun-cli-linux-latest-amd64.tgz ... sudo mv aliyun /usr/local/bin/
Recommendation

Install Aliyun CLI from official sources, verify downloads where possible, and keep it updated under normal enterprise software controls.

What this means

Generated reports may include cloud-changing commands that could affect connectivity or access if a user runs them.

Why it was flagged

The report template encourages actionable remediation commands and includes an example that changes security group rules. The artifact frames these as recommendations, not commands to execute automatically.

Skill content
处置建议应包含具体可执行的命令 ... aliyun ecs RevokeSecurityGroup
Recommendation

Treat remediation commands in reports as suggestions; review them manually and obtain approval before executing changes in Alibaba Cloud.