Skylv Agent Settings Manager

PassAudited by ClawScan on May 10, 2026.

Overview

This skill is coherent for configuration management, but it can involve production settings, secrets, and auto-sync, so users should verify the actual tooling before using it.

Before using this skill, confirm what config.js implementation will actually run, use least-privilege Git/Vault credentials, require explicit approval for production changes, and avoid enabling watch/auto-reload or version history for sensitive configs without review and retention controls.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A mistaken or unreviewed command could change production behavior or invalidate credentials.

Why it was flagged

The skill documents commands that can affect production configuration and rotate secrets. These are aligned with configuration management and shown as user-run examples, but they are high-impact operations.

Skill content
node config.js env promote --from staging --to production --dry-run
node config.js secrets rotate --env production --keys API_KEY,DB_PASSWORD
Recommendation

Use dry-run mode, require explicit approval for production changes, and confirm backups or rollback procedures before running mutation commands.

What this means

If connected to real secret stores, the agent could view, set, or rotate sensitive credentials depending on the external tool's permissions.

Why it was flagged

The skill explicitly includes secret management through a Vault-like provider. This is expected for the stated purpose, but it means the agent may need access to sensitive secret-management permissions.

Skill content
"secrets": {
  "provider": "vault",
  "rotation": "90d",
  "scanForLeaks": true
}
Recommendation

Use scoped credentials, separate dev/staging/production access, avoid pasting raw secrets into chat, and audit any secret rotation actions.

What this means

Users may need to supply or trust an external/local config.js, whose behavior was not assessed in this review.

Why it was flagged

The documented workflow relies on a config.js helper, but the supplied artifact set is instruction-only and does not include that file, so the actual implementation and provenance are not reviewable here.

Skill content
node config.js validate --file config.json --schema config.schema.json
Recommendation

Only run a config.js implementation from a trusted source and review its code, dependencies, and permissions before using it with production configs or secrets.

What this means

Old configuration values, including sensitive or unsafe settings if not filtered, could remain available through history or rollback.

Why it was flagged

The skill describes persistent configuration history. Since the same skill also handles environment variables and secrets, users should ensure sensitive values are excluded or protected in stored versions.

Skill content
Full version history with diff and rollback capabilities.
Recommendation

Keep secrets out of version history, encrypt stored configuration data, and review rollback targets before reusing older configurations.

What this means

A malformed or malicious configuration commit could affect multiple environments or agents if auto-sync and auto-reload are enabled.

Why it was flagged

The skill supports syncing production configuration from Git and automatically reloading on changes. That is coherent for config management, but a bad config change could propagate quickly.

Skill content
node config.js sync --source git --repo org/configs --path /production
node config.js sync --watch --auto-reload --debounce 5s
Recommendation

Use branch protection, signed/reviewed config changes, staged rollout, and disable auto-reload for critical production systems unless monitored.