Skylv Log Aggregation

ReviewAudited by ClawScan on May 10, 2026.

Overview

This appears to be a legitimate log aggregation helper, but it asks for broad local and cloud log access without clear credential, storage, redaction, retention, or export limits.

Before installing, decide exactly which logs the agent may read and where results may be stored or exported. Use least-privilege cloud roles, avoid broad patterns like all of /var/log unless necessary, redact secrets and personal data, and require explicit approval for exports and alert rules.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Application and system logs often contain user identifiers, tokens, error details, internal URLs, and other sensitive data; broad indexing could expose or preserve more private information than intended.

Why it was flagged

This describes broad aggregation of potentially private logs into a searchable store, but the artifact does not define source limits, exclusions, redaction, retention, access controls, or reuse boundaries.

Skill content
> All your logs in one place. ... **Collect logs** — From files, stdout, syslog, Docker, cloud services
Recommendation

Use only explicitly selected log sources, redact secrets and personal data before indexing, define retention/deletion rules, and avoid letting the agent ingest broad system or cloud logs by default.

What this means

The agent might use broad ambient cloud credentials or local profiles to read organization logs beyond the intended services or time ranges.

Why it was flagged

Cloud log access normally requires provider account credentials or roles, but the supplied metadata declares no primary credential, required env vars, or config paths, so the credential source and privilege scope are unclear.

Skill content
**Cloud**: AWS CloudWatch, GCP Logging, Azure Monitor
Recommendation

Document the exact credential source and required scopes, use dedicated read-only logging roles, and require explicit user selection of accounts, projects, services, and time windows.

What this means

A mistaken command or overly broad path could collect or export more logs than expected.

Why it was flagged

These operations are central to a log aggregation skill, but if mapped to agent tools they can read broad local paths, write/export results, and create ongoing alert rules.

Skill content
`collect logs from <path>` ... `export logs to <file>` ... `alert when <condition>`
Recommendation

Confirm paths, time ranges, export destinations, and alert conditions before execution, and prefer narrow service-specific log locations.

What this means

It is harder to verify who maintains the skill or whether its instructions match a trusted implementation.

Why it was flagged

There is no code or installer present, which reduces install-time execution risk, but the instruction source has limited provenance.

Skill content
Source: unknown; Homepage: none
Recommendation

Review the SKILL.md carefully before use and prefer a known, documented source for production log access.