Vmware Avi
v1.5.7Use this skill whenever the user mentions load balancing, ingress, virtual services, pool members, AVI, NSX ALB, AKO, or application delivery. Also trigger w...
⭐ 0· 230·0 current·0 all-time
by@zw008
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
The skill is a thin wrapper / instruction set for the 'vmware-avi' CLI and AKO operations. Required binary (vmware-avi), config paths (~/.vmware-avi/config.yaml and .env), and controller password env var patterns (e.g., PROD_AVI_PASSWORD) align with managing AVI controllers and AKO; optional kubectl/helm/kubeconfig for AKO mode is expected.
Instruction Scope
SKILL.md instructs only on controller queries, VS/pool/AKO operations, config generation, and diagnostics. It reads local config, .env (for passwords), and kubeconfig (read-only) as expected. Destructive operations require double-confirmation and audit logging is documented. There are no instructions to read unrelated system files or to transmit data to unexpected third-party endpoints.
Install Mechanism
The registry entry is instruction-only (no packaged install spec), but SKILL.md tells users to install via 'uv tool install vmware-avi' and documents dependencies (avisdk, kubernetes Python packages, vmware-policy). This is reasonable, but verify the upstream 'vmware-avi' package source (GitHub repo) before installing since the skill relies on an external package manager to fetch code.
Credentials
Declared required env var is VMWARE_AVI_CONFIG (overrides config path) and required config files live in the user's home directory; per-controller password env vars in ~/.vmware-avi/.env are justified for controller authentication. No unrelated secrets or excessive credential requests are present.
Persistence & Privilege
The skill does not request always:true, does not modify other skills, and confines files to user-home (~/.vmware-avi and ~/.vmware). It documents local audit logging (~/.vmware/audit.db). Autonomous invocation is allowed by default (normal) but not combined with unusual privileges.
Assessment
This skill appears coherent for managing AVI controllers and AKO. Before installing: (1) verify you trust the upstream GitHub repo/package (vmware-avi) that 'uv' will install, (2) keep ~/.vmware-avi/.env permissions to 600 and avoid committing it, (3) confirm vmware-policy/audit behavior meets your requirements (audit DB location and contents), and (4) test destructive operations (VS disable, pool disable, AKO restart/upgrade) in a lab or with the documented double-confirm prompts enabled. If you want extra assurance, review the upstream repository code referenced in SKILL.md prior to running 'uv tool install'.Like a lobster shell, security has layers — review code before you run it.
latestvk97fnp2phktwf1c8t8vssjkf0n84xsm1
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🔀 Clawdis
OSmacOS · Linux
Binsvmware-avi
EnvVMWARE_AVI_CONFIG
Config~/.vmware-avi/config.yaml, ~/.vmware-avi/.env
Primary envVMWARE_AVI_CONFIG
