DevPlaza SDLC Process Guardian

ReviewAudited by ClawScan on May 14, 2026.

Overview

The skill is mostly coherent for DevPlaza workflow automation, but it tells the agent to read local .env credentials at session start even though no credential or environment-variable requirements are declared.

Review the skill's credential behavior before installing. If you use it, run it only in a workspace whose .env file contains DevPlaza-specific, least-privilege credentials, and verify every run or deploy trigger before approving it.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent could read and use DevPlaza credentials from the user's local workspace before explicitly asking, and users may not realize this from the install metadata.

Why it was flagged

This directs the agent to access local credential material automatically, including JWTs or username/password authentication, while the registry metadata declares no required env vars or primary credential.

Skill content
At session start, resolve runtime config from local workspace files before asking the user. Read `.env` first... If `.env` already contains `BASE_URL` and auth (`JWT` or `AUTH_EMAIL` + `AUTH_PASSWORD`), do not ask for them again.
Recommendation

Declare the expected credential variables in metadata, ask before reading .env files, limit parsing to the specific DevPlaza keys, and recommend a least-privilege DevPlaza token instead of account passwords.

What this means

If used, the skill may start DevPlaza runs or deployment-stage tooling under the user's account, which can affect real projects.

Why it was flagged

The skill can perform write or trigger operations against DevPlaza workflows, including deployment-related actions, but it also includes user-intent and confirmation guardrails.

Skill content
Prefer read-first behavior unless user explicitly asks for a write/trigger operation. Require explicit confirmation before production-impacting actions.
Recommendation

Users should confirm the target tenant, product, stage, and environment before allowing trigger or deploy actions.

What this means

A SonarQube API token may be used during governance checks, so improper configuration or logging could expose access to code-quality data.

Why it was flagged

The skill handles a SonarQube API token from task-tool configuration and sends it to a DevPlaza product endpoint for governance evaluation. This appears purpose-aligned, but it is sensitive token handling.

Skill content
SonarQube tools use a separate evaluation path: call `POST /api/v1/product/sonarqube/last/status` with `{ componentId, link, apiToken }` from task-tool config.
Recommendation

Keep SonarQube tokens scoped to read-only status checks where possible and ensure outputs never include the token.