Alibabacloud Dms Skill
Security checks across static analysis, malware telemetry, and agentic risk
Overview
This is a disclosed Alibaba Cloud DMS SQL helper, but it can use your Alibaba Cloud credentials to search databases and run approved SQL writes, so review permissions and SQL carefully.
Install only if you intend an agent to help run DMS database searches and SQL. Use a dedicated Alibaba Cloud RAM profile with the narrowest possible database permissions, confirm every SQL statement before execution, avoid pasting access keys into chat, and run CLI/plugin setup commands manually from trusted sources.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
VirusTotal findings are pending for this skill version.
Risk analysis
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A mistaken or overbroad SQL statement could change or delete business data in an accessible database.
The script sends the supplied SQL directly to Alibaba Cloud DMS and supports data-changing SQL when --force is used.
CMD_ARGS=( "dms-enterprise" "execute-script" ... "--db-id" "$DB_ID" "--script" "$SQL" ... ); ... "--force Skip confirmation for write operations (INSERT/UPDATE/DELETE)"
Confirm the exact SQL before running it, use --dry-run for write previews, keep backups, and prefer read-only or database-specific permissions where possible.
If the active cloud identity is over-privileged, the agent could operate on more databases than intended.
The documented RAM policy can grant broad DMS execution authority across accessible resources, including SQL that mutates data.
"Action": ["dms:GetUserActiveTenant", "dms:SearchDatabase", "dms:ExecuteScript"], "Resource": "*" ... "This permission allows execution of SELECT, DML, and DDL statements."
Use a dedicated RAM user/profile scoped to the required tenant and database IDs, restrict to SELECT for read-only use cases, and enable DMS audit logging.
Running installer or plugin-update commands changes the local CLI environment and may install code from Alibaba Cloud's distribution channel.
The setup guidance uses a remote installer and updates/auto-installs CLI plugins. This is related to the Aliyun CLI workflow, but it is still a code/provenance step users should review.
run `curl -fsSL https://aliyuncli.alicdn.com/setup.sh | bash` to install/update ... `aliyun configure set --auto-plugin-install true && aliyun plugin update`
Install the Aliyun CLI from a trusted official source, verify the installer URL, run setup manually, and disable auto-plugin-install later if it is not desired.
The agent's database access is whatever the current Aliyun profile allows.
The skill relies on the user's existing Aliyun credential profile rather than handling credentials itself. That is expected, but it means actions run under the active cloud identity.
Credentials configured via `aliyun configure` ... Check the output for a valid profile (AK, STS, or OAuth identity).
Use a dedicated low-privilege profile for this skill and do not paste access keys into chat or command examples.
