DevPlaza SDLC Tool Chain Setup

ReviewAudited by ClawScan on May 14, 2026.

Overview

This is a coherent instruction-only DevPlaza admin setup skill, but it handles sensitive credentials and can change or delete toolchain bindings, so users should confirm scope carefully.

Install only if you intend an agent to help configure DevPlaza SDLC toolchain bindings. Check that any .env credentials, JWTs, passwords, and provider tokens are scoped to the correct tenant and project, and review every create, update, or delete confirmation before approving it.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent may authenticate to DevPlaza using local credentials and operate with admin-level setup permissions.

Why it was flagged

The skill may use local authentication/session secrets and tenant/product/project identifiers to operate as a Team Admin or Company Admin. This is relevant to the stated setup purpose, but users should recognize it as sensitive account authority.

Skill content
Read `.env` first for `BASE_URL`, `JWT`, `AUTH_EMAIL`, `AUTH_PASSWORD`, `TENANT_ID`, `PRODUCT_ID`, `PROJECT_ID`.
Recommendation

Use least-privileged admin credentials, ensure the .env file is intended for this tenant/project, and avoid sharing or exposing JWTs, passwords, or provider tokens.

What this means

A confirmed action could change the SDLC toolchain for a product/project or permanently remove a binding.

Why it was flagged

The skill documents API operations that create, update, and permanently delete DevPlaza tool bindings. These operations are expected for toolchain setup and include explicit confirmation requirements, but they can materially change project configuration.

Skill content
`POST /api/v1/product/task-tools/`, `PUT /api/v1/product/task-tools/:id`, and `DELETE /api/v1/product/task-tools/:id` ... `Always ask explicit confirmation with binding name + id before deleting. Permanent — cannot be undone.`
Recommendation

Before confirming any write or delete, verify the tenant, product, project, tool, binding name, and binding ID.

What this means

Provider API keys or tokens may be validated and saved into DevPlaza configuration.

Why it was flagged

The skill collects and stores provider credentials as part of task-tool binding setup, while also instructing the agent to mask them. This is purpose-aligned but involves sensitive third-party account access.

Skill content
`toolsConfig` — provider credentials object ... `Never print credentials (apiToken, botToken, apiKey, appKey, token) in responses. Mask all credential values in output.`
Recommendation

Provide only credentials intended for DevPlaza integration, prefer scoped/rotatable tokens, and confirm that masked credentials are not printed in responses.