Back to skill
v1.4.0

Architecture Inventory & Risk Assessment

ReviewClawScan verdict for this skill. Analyzed May 1, 2026, 8:09 AM.

Analysis

This skill is related to Tencent Cloud architecture assessment, but it asks for powerful cloud credentials, can create persistent IAM roles with broad policies, and includes unrelated bulk-publishing anti-spam materials.

GuidanceBefore installing, make sure you trust the publisher. Do not use root or overly broad Tencent Cloud AK/SK credentials; use a limited subaccount or temporary credentials if possible. Carefully review any request to create the `advisor` CAM role, especially the attached QcloudTAGFullAccess and QcloudAdvisorFullAccess policies, and remove the role when no longer needed.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

Abnormal behavior control

Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.

Human-Agent Trust Exploitation
SeverityMediumConfidenceHighStatusConcern
SKILL.md
`QcloudAdvisorFullAccess`(智能顾问只读访问权限,不影响其他云资源) ... `QcloudTAGFullAccess`(标签全读写权限)、`QcloudAdvisorFullAccess`(智能顾问全读写权限)

The same role setup is framed as read-only in one place but later described as full read/write and includes tag permissions, which could mislead a user approving the IAM change.

User impactA user may consent believing the role is only for viewing, while the described policies allow broader account changes.
RecommendationThe skill should consistently state the exact policy effects and remove claims that the access is read-only unless the attached policies truly are read-only.
Agentic Supply Chain Vulnerabilities
SeverityMediumConfidenceHighStatusConcern
PUBLISH_GUIDE.md
使用优化后的批量发布脚本 ... `MAX_PER_TOKEN = 3` ... Token 轮换 ... 修改 metadata 中的权限和依赖

The package includes guidance for bulk publishing, token rotation, and changing metadata/dependencies to avoid anti-spam detection, which is unrelated to the architecture assessment skill.

User impactThis raises trust and provenance concerns about how the skill was produced and published, even if those files are not part of the normal user workflow.
RecommendationInstall only if you trust the publisher; maintainers should remove publishing/evasion artifacts from the skill package and publish from a clean, purpose-specific source.
Unexpected Code Execution
SeverityLowConfidenceHighStatusNote
SKILL.md
python3 {baseDir}/check_env.py ... python3 {baseDir}/scripts/create_role.py ... python3 {baseDir}/scripts/tcloud_api.py

The skill relies on local Python helper scripts for environment checks, role creation, and Tencent Cloud API calls; this is disclosed and purpose-aligned but important because some scripts perform high-impact account operations.

User impactUsing the skill may run local scripts that access cloud credentials and, with approval, change cloud IAM configuration.
RecommendationReview the scripts and only approve role-creation or cleanup commands when you understand the cloud-account changes.
Permission boundary

Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.

Identity and Privilege Abuse
SeverityHighConfidenceHighStatusConcern
SKILL.md
关联策略:`QcloudTAGFullAccess`(标签全读写权限)、`QcloudAdvisorFullAccess`(智能顾问全读写权限)

The skill’s setup can attach full read/write Tencent Cloud policies to a persistent CAM role, which is broader than simple architecture inventory or risk viewing.

User impactA user could authorize creation of a cloud role that can modify tag data and Smart Advisor settings, not just read architecture information.
RecommendationUse a least-privilege read-only policy where possible, remove QcloudTAGFullAccess unless strictly required, and create/delete the role only after reviewing the exact permissions.
Identity and Privilege Abuse
SeverityMediumConfidenceHighStatusConcern
SKILL.md
**环境变量必须永久写入 shell 配置文件** ... echo 'export TENCENTCLOUD_SECRET_KEY="your-secret-key"' >> ~/.bashrc

The instructions require long-lived Tencent Cloud credentials to be stored permanently in shell startup files, increasing exposure if those files are backed up, synced, or read by other tools.

User impactYour Tencent Cloud secret key may remain on disk indefinitely and be available to future shell sessions or local processes.
RecommendationPrefer temporary or tightly scoped credentials, avoid using root/admin AK/SK, and consider a credential manager or session-only environment variables instead of permanent shell-profile storage.