Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Vmware Pilot

v1.5.14

Use this skill whenever the user wants to design, execute, or manage complex multi-step VMware workflows with human approval and automatic rollback. Pilot is...

0· 184·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for zw008/vmware-pilot.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Vmware Pilot" (zw008/vmware-pilot) from ClawHub.
Skill page: https://clawhub.ai/zw008/vmware-pilot
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Required env vars: VMWARE_PILOT_CONFIG
Required binaries: vmware-pilot-mcp
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install vmware-pilot

ClawHub CLI

Package manager switcher

npx clawhub@latest install vmware-pilot
Security Scan
Capability signals
Crypto
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description (multi-skill VMware orchestration with approval gates and rollback) aligns with the provided files: SKILL.md documents an MCP server, lists companion skills, templates, and orchestration tools. Required binary 'vmware-pilot-mcp' and references to companion skills are appropriate for an orchestration layer.
Instruction Scope
Runtime instructions and references are largely scoped to orchestration: design_workflow/plan_workflow/run_workflow, approval gates, and delegation to companion skills. However, the skill instructs the agent to read and hot-load user files from ~/.vmware/workflows/, persist state to ~/.vmware/workflows.db and ~/.vmware/audit.db, and log full tool calls/parameters — these are expected for a workflow orchestrator but do give the skill access to user home data and cause persistent recording of potentially sensitive parameters passed through workflows.
Install Mechanism
Registry metadata says 'No install spec' but the SKILL.md includes pip/uvx install instructions and an 'installer: kind: uv' header. This is not dangerous by itself but is an inconsistency to clarify: if you plan to install, ensure you install from the official/expected source (the GitHub repo is cited) and verify the vmware-pilot-mcp binary provenance.
!
Credentials
The skill declares a required environment variable and primary credential VMWARE_PILOT_CONFIG, but SKILL.md also claims 'Pilot has no config file of its own. No credentials stored.' This is contradictory — you should confirm what VMWARE_PILOT_CONFIG holds (path, token, or JSON). Also, because Pilot logs tool calls/parameters to an audit DB, parameters forwarded from companion skills (which may include sensitive credentials or identifiers) could be persisted. The single env var requested is plausible for an orchestrator, but the lack of clarity about its content is a concern.
Persistence & Privilege
The skill persists state and audit logs under ~/.vmware/ (workflows.db, audit.db) and supports hot-loaded templates from ~/.vmware/workflows/. This is normal for an orchestrator but gives it persistent local presence and access to the user's home directory. The skill is not marked 'always: true' and does not request system-wide changes beyond its own directories, which is appropriate; still, persistent logging of parameters raises data-exposure considerations.
Scan Findings in Context
[NO_PRESCAN_FINDINGS] expected: Static pre-scan found no injection signals; this is plausible because much of the security surface is in prose (SKILL.md) and small helper scripts. Absence of findings is not proof of safety—review runtime behavior (audit logging, file writes) and provenance of the vmware-pilot-mcp binary.
What to consider before installing
This package looks like a legitimate local orchestration layer for multi-step VMware workflows, but review a few items before installing or granting it access: 1) Clarify VMWARE_PILOT_CONFIG: what exact value (file path, token, JSON) does it expect? The SKILL.md's claim of 'no config' conflicts with the declared required env var. 2) Understand audit persistence: Pilot will log every tool call and its parameters to ~/.vmware/audit.db — those logs could contain sensitive identifiers or parameters passed from companion skills. If that is unacceptable, do not enable the skill or ensure the audit DB is protected/rotated. 3) Verify provenance: install the vmware-pilot-mcp binary only from a trusted source (validate the GitHub repo, release signatures if available). 4) Test in an isolated environment first: install and run with dry-run templates and without connecting companion skills to confirm observed behavior (file creation under ~/.vmware, DB contents, exact use of VMWARE_PILOT_CONFIG). 5) Confirm companion skills' configs are stored and handled securely (they hold the actual vCenter/NSX credentials). If you cannot confirm what VMWARE_PILOT_CONFIG contains or you cannot trust the vmware-pilot-mcp binary source, treat this skill as untrusted.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

🧭 Clawdis
OSmacOS · Linux
Binsvmware-pilot-mcp
EnvVMWARE_PILOT_CONFIG
Primary envVMWARE_PILOT_CONFIG
latestvk97839nxzzxvr9p2fgq5cegb0x858pnr
184downloads
0stars
8versions
Updated 6d ago
v1.5.14
MIT-0
macOS, Linux

VMware Pilot

Disclaimer: This is a community-maintained open-source project and is not affiliated with, endorsed by, or sponsored by VMware, Inc. or Broadcom Inc. "VMware" is a trademark of Broadcom. Source code is publicly auditable at github.com/zw008/VMware-Pilot under the MIT license.

Multi-step workflow orchestration for VMware MCP skills — design, approve, execute, rollback.

Companion Skills: vmware-aiops (VM operations) | vmware-monitor (monitoring) | vmware-nsx (networking) | vmware-aria (metrics/alerts) | vmware-avi (load balancing/AKO)

What This Skill Does

CapabilityDescription
Workflow DesignNatural language goal → AI designs steps from 8 skills' 185 tools
Approval GatesPause execution for human review before destructive operations
State PersistenceSQLite-backed, survives restarts, supports resume from checkpoint
RollbackReverse completed steps in order if workflow fails
Custom TemplatesSave workflows as YAML for reuse, hot-reload without restart
Compliance ScansRead-only health/capacity/anomaly checks across skills

Quick Install

pip install vmware-pilot
# or
uvx --from vmware-pilot vmware-pilot-mcp

When to Use This Skill

ScenarioUse Pilot?Why
"Clone VM, test, then apply to prod"YesMulti-step + approval
"Power on a VM"No, use aiopsSingle operation
"Set up app network + firewall + VMs"YesCross-skill orchestration
"Check cluster health"No, use monitor/ariaSingle read-only query
"Diagnose and fix an alert"Yesincident_response template
"Run compliance check"Yescompliance_scan template
"Drain server, patch, restore traffic"YesCross-skill: avi drain + aiops patch
"Deploy app with AKO ingress"YesCross-skill: aiops + vks + avi
"Check pool member health"No, use aviSingle read-only query

Related Skills — Skill Routing

User IntentRecommended Skill
VM lifecycle (power, clone, deploy)vmware-aiops (uv tool install vmware-aiops)
Read-only monitoringvmware-monitor (uv tool install vmware-monitor)
NSX networking (segments, gateways, NAT)vmware-nsx (uv tool install vmware-nsx-mgmt)
NSX security (DFW, groups)vmware-nsx-security (uv tool install vmware-nsx-security)
Aria metrics/alerts/capacityvmware-aria (uv tool install vmware-aria)
Tanzu Kubernetes (Supervisor/TKC)vmware-vks (uv tool install vmware-vks)
Storage (iSCSI, vSAN, datastores)vmware-storage (uv tool install vmware-storage)
Load balancing, VS, pool, AKOvmware-avi (uv tool install vmware-avi)
Audit log queryvmware-policy (vmware-audit CLI)
Multi-step orchestrationvmware-pilot (this skill)

Common Workflows

1. Design a Custom Workflow (Interactive)

User: "I need to set up a new app environment with networking and VMs"

AI calls: get_skill_catalog()          → see available tools
AI calls: design_workflow(goal="...")   → create draft
AI calls: update_draft(id, steps=[...]) → fill in steps
User reviews and confirms
AI calls: confirm_draft(id, save_as_template=True)
AI calls: run_workflow(id)             → execute with approval gates

2. Clone-and-Test (Built-in Template)

AI calls: plan_workflow("clone_and_test", {
    target_vm: "db01",
    change_spec: {memory_mb: 32768},
    target: "vcenter-prod"
})
AI calls: run_workflow(workflow_id)
→ Clone → Apply → Monitor → [Approval Gate] → Commit → Cleanup

3. Batch Operations with Approval

AI calls: plan_workflow("plan_and_approve", {
    operations: [
        {action: "power_off", vm_name: "db01"},
        {action: "revert_snapshot", vm_name: "db01", snapshot_name: "baseline"},
        {action: "power_on", vm_name: "db01"}
    ]
})
→ Create Plan → [Approval Gate] → Execute Plan (with auto-rollback on failure)

4. Rolling Maintenance with AVI Drain

Drain traffic from a pool member via AVI, patch the server, then restore traffic:

1. vmware-avi pool disable <pool> <server>     # drain traffic from pool member
2. vmware-avi analytics <vs>                    # verify drain complete (0 active connections)
3. vmware-aiops vm guest-exec <vm> --cmd "apt-get upgrade -y"   # patch the server
4. vmware-avi pool enable <pool> <server>       # restore traffic to pool member
5. vmware-avi pool members <pool>               # verify health status is green

5. AKO-Aware Application Deployment

Deploy a backend VM, create a K8s namespace, and wire up AKO Ingress to the AVI Controller:

1. vmware-aiops deploy ova <image> --name <vm>  # deploy backend VM
2. vmware-vks namespace create <ns>             # create K8s namespace
3. kubectl apply -f ingress.yaml                # create Ingress with AKO annotations
4. vmware-avi ako ingress check <ns>            # validate AKO annotations are correct
5. vmware-avi ako sync status                   # verify VS created on AVI Controller

MCP Tools (11 — 3 read, 8 write/control)

CategoryToolRiskDescription
Discoveryget_skill_cataloglowAvailable skills and tools for design
list_workflowslowBuilt-in + custom templates
Designdesign_workflowlowNatural language → draft
update_draftmediumEdit draft steps
confirm_draftmediumFinalize draft → ready to execute
Executeplan_workflowmediumCreate from template
create_workflowmediumOne-step custom creation
run_workflowmediumExecute (pauses at approval)
ControlapprovehighHuman approval to continue
rollbackhighReverse completed steps
get_workflow_statuslowState + audit log

Built-in Templates (4)

TemplateStepsApprovalSkills Used
clone_and_test6Yesaiops + monitor
incident_response4Yesmonitor + aiops
plan_and_approve3Yesaiops
compliance_scan3Nomonitor + aria

Custom Templates

Drop YAML files in ~/.vmware/workflows/ — pilot auto-loads them.

# ~/.vmware/workflows/restart_cluster.yaml
name: restart_cluster
description: Rolling restart of database cluster
steps:
  - action: check_health
    skill: monitor
    tool: get_alarms
    params:
      target: "{{target}}"
  - action: stop_replica
    skill: aiops
    tool: vm_power_off
    params:
      vm_name: "{{replica_vm}}"
    rollback_tool: vm_power_on
    rollback_params:
      vm_name: "{{replica_vm}}"
  - action: require_approval
    skill: pilot
    tool: approve
    params:
      message: "Replica stopped. Proceed?"
  - action: restart_primary
    skill: aiops
    tool: vm_power_off
    params:
      vm_name: "{{primary_vm}}"

Usage Mode

ScenarioRecommendedWhy
Local/small models (Ollama, Qwen)MCPStructured JSON I/O for multi-step state
Cloud models (Claude, GPT-4o)MCPDesign mode needs structured tool calls
CI/CD pipeline orchestrationMCPProgrammatic plan/approve/run cycle
Quick template listingCLIvmware-pilot-mcp is MCP-only; use MCP client

Note: vmware-pilot is MCP-only (no standalone CLI). All interactions go through MCP tool calls. Other skills in the family (aiops, monitor, avi, etc.) offer both CLI and MCP modes.

CLI Quick Reference

vmware-pilot is an MCP-only server (no standalone CLI binary). Interact via MCP tool calls:

# Start the MCP server
uvx --from vmware-pilot vmware-pilot-mcp

# Validate a custom workflow YAML before loading
python3 scripts/validate_workflow.py ~/.vmware/workflows/my_workflow.yaml

# List available tools across all skills (design helper)
python3 scripts/list_available_tools.py          # all skills
python3 scripts/list_available_tools.py aiops    # specific skill
python3 scripts/list_available_tools.py --json   # JSON output

# View audit logs (via vmware-policy)
vmware-audit log --last 20
vmware-audit log --status denied

Full CLI reference for companion skills: see references/cli-reference.md

Troubleshooting

Workflow stuck in "awaiting_approval"

Call approve(workflow_id) with the correct workflow ID to continue, or rollback(workflow_id) to abort. If the MCP session was lost, reconnect and call get_workflow_status(workflow_id) to see the current state -- workflows persist in SQLite and survive restarts.

"Unknown workflow type" error from plan_workflow

The template name is case-sensitive. Use list_workflows() to see all available built-in and custom template names. Custom templates must be valid YAML in ~/.vmware/workflows/.

Custom YAML template not appearing

  1. Verify the file is in ~/.vmware/workflows/ with a .yaml extension
  2. Check YAML syntax -- run python3 scripts/validate_workflow.py <path> to validate
  3. Template names must be unique -- a custom template cannot shadow a built-in name

Rollback fails on some steps

Not all steps are reversible. Steps without rollback_tool defined are skipped during rollback. Pilot uses best-effort rollback: if one rollback step fails, it continues with remaining steps and reports which succeeded and which failed.

"Workflow cannot be run" state error

A workflow can only be run from pending or running states. If it is in draft, call confirm_draft() first. If it is in completed or failed, create a new workflow -- completed workflows cannot be re-run.

vmware-policy dependency missing

Pilot requires vmware-policy for the @vmware_tool decorator and audit logging. It is declared as a dependency in pyproject.toml and should install automatically. If missing, run pip install vmware-policy or reinstall pilot.

Setup

No vCenter credentials needed — pilot orchestrates other skills that handle connections.

{
  "mcpServers": {
    "vmware-pilot": {
      "command": "uvx",
      "args": ["--from", "vmware-pilot", "vmware-pilot-mcp"]
    }
  }
}

Audit & Safety

All operations are automatically audited via vmware-policy (@vmware_tool decorator):

  • Every tool call logged to ~/.vmware/audit.db (SQLite, framework-agnostic)
  • Policy rules enforced via ~/.vmware/rules.yaml (deny rules, maintenance windows, risk levels)
  • Risk classification: each tool tagged as low/medium/high/critical
  • View recent operations: vmware-audit log --last 20
  • View denied operations: vmware-audit log --status denied

vmware-policy is automatically installed as a dependency — no manual setup needed.

License

MIT

Comments

Loading comments...