Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Alibabacloud Analyticdb Postgresql Supabase Ops
v0.0.1Manage the full lifecycle of ADBPG Supabase projects. Use for listing/querying projects, create, pause/resume, reset password, API Keys, and security IP mana...
⭐ 0· 46·0 current·0 all-time
byalibabacloud-skills-team@sdk-team
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Suspicious
high confidencePurpose & Capability
The SKILL.md explicitly requires the Aliyun CLI and valid Alibaba Cloud credentials (AK/SK, STS or OAuth profile) and performs gpdb/vpc operations — all coherent with the stated purpose. However, the skill registry metadata declares no required binaries and no required env vars/primary credential, which is incorrect and inconsistent with the instructions. A manifest for an Alibaba Cloud CLI-driven skill should declare the Aliyun CLI and note credential requirements.
Instruction Scope
Instructions are narrowly scoped to running `aliyun gpdb` and `aliyun vpc` commands, doing discovery, creating projects, polling status, and enforcing user confirmations for mutating actions. They forbid printing AK/SK and require `aliyun configure list` as a pre-check. The docs suggest using auxiliary tools (python/openssl/jq) for password generation and JSON parsing but do not list them in metadata — this is a practical gap but not inherently malicious. The skill will retrieve sensitive items (API keys, dashboard account info) as part of normal operations; the SKILL.md lacks explicit guidance to avoid echoing or logging those retrieved secrets.
Install Mechanism
This is an instruction-only skill with no install spec and no code executed by the platform. The included CLI install docs reference official Aliyun download hosts (aliyuncli.alicdn.com) and Homebrew, which are expected and reasonable. No arbitrary third-party download URLs are embedded in executable install steps.
Credentials
The skill requires access to Alibaba Cloud credentials and RAM permissions to perform list/get/create/pause/resume/reset/modify operations, which is proportionate to its purpose—but the skill manifest does not declare these required environment variables or primary credential. Additionally, the skill's operations return sensitive secrets (Supabase API keys and dashboard credentials); the guidance forbids printing AK/SK but does not explicitly instruct safe handling or redaction of API keys/dashboard credentials returned by the APIs. The combination of undeclared credential requirements and unclear handling of returned secrets is a security concern.
Persistence & Privilege
The skill is not always-enabled and does not request system-wide persistence or modify other skills. It does not ask to write to agent config or escalate privileges. Autonomous invocation is allowed (platform default) but not accompanied by other high-risk factors here.
What to consider before installing
This skill appears to do what it says (manage Alibaba Cloud ADBPG Supabase projects) but the package metadata is inconsistent with the runtime instructions. Before installing or using it: 1) Ensure you have the Aliyun CLI (>=3.3.1) available locally and have configured your Alibaba Cloud credentials via the CLI (do not paste AK/SK into chat). 2) Limit the RAM permissions used by the account to the minimum required (use a scoped management role rather than broad account keys). 3) Be aware the skill will retrieve Supabase API keys and dashboard credentials — decide how you want those secrets handled (avoid logging them or pasting them into transcripts). 4) Ask the publisher to update the skill metadata to declare required binaries (aliyun, jq/python/openssl if used) and required credential/environment variables and to add explicit rules for safe handling/redaction of API keys and dashboard credentials. If the author provides corrected metadata and explicit secret-handling rules, the inconsistency concern would be resolved and the skill could be considered coherent.Like a lobster shell, security has layers — review code before you run it.
latestvk9772chkb5tneg864z08tzvc2n84edaz
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
