Alibabacloud Ddoscoo Intercept Query
PassAudited by ClawScan on Apr 30, 2026.
Overview
The skill's files and runtime instructions are coherent with its stated purpose (querying Alibaba Cloud DDoS Pro intercept logs via the Aliyun CLI and SLS); required permissions and actions align with that goal, with only a few operational notes to watch for.
This skill appears to do what it says: it queries Alibaba Cloud DDoS Pro and SLS logs via the Aliyun CLI and produces an analysis. Before using it, ensure you: (1) run it in an environment with appropriate Alibaba Cloud credentials (use a least-privilege RAM user or STS token, not root keys); (2) review and grant only the RAM permissions listed in references/ram-policies.md; (3) be aware the skill will ask you to enable AI-mode and may install CLI plugins (these change your local Aliyun CLI config and download code from Alibaba's distribution servers) — verify AI-mode is disabled at exit; (4) do not paste AK/SK into chat — configure credentials outside this session; and (5) if you rely on the helper script, note it masks many sensitive fields but may print raw CLI output in error cases (review that behaviour if logs may contain secrets). If any of those points are unacceptable, do not install/run the skill until addressed.
