Consul Service Deregister

v1.0.4

Consul service deregistration tool. Triggered when users mention Consul deregister, remove service instance, service removal, or offline. Supports batch dere...

0· 63·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description match the included Python script and SKILL.md. The script implements Deregister via Consul's /v1/agent/service/deregister endpoint and supports the documented modes (service-id + agents, parse curl, agents file, dry-run, ACL token, parallel execution). Nothing requested or installed is unrelated to Consul deregistration.
Instruction Scope
Instructions explicitly tell the agent to run the bundled Python script and describe reading an agents file or parsing curl text — all within the scope of deregistration. Minor caveat: example commands reference a user-specific absolute path (/Users/shiheng/.qclaw/...), which may not match the runtime environment; the agent should run the skill's script from the correct workspace path. The skill will also accept arbitrary agent addresses and ACL tokens and will send HTTP requests to them (expected but potentially destructive if used incorrectly).
Install Mechanism
No install spec or external downloads — instruction-only with a small included script. There are no external packages or network-based installers to review.
Credentials
No required environment variables or declared credentials. The script accepts an optional --token argument for Consul ACL tokens (documented). The requested inputs are proportional to the stated function — no unrelated secrets or services are requested.
Persistence & Privilege
Skill is not always-enabled and does not request persistent or elevated platform privileges. It does not modify other skills or system-wide settings.
Assessment
This skill appears coherent and implements Consul service deregistration as described, but deregistration is a destructive operation. Before using it: (1) run with --dry-run to verify target URLs and service IDs; (2) double-check the list of agents (agents file or pasted curl commands) to avoid accidental broad impact; (3) never paste production ACL tokens into untrusted contexts — provide tokens only when necessary and prefer short-lived tokens scoped to deregistration if your environment supports them; (4) be aware the script will send PUT requests to arbitrary host:port addresses you supply, so confirm network targets are correct; (5) if you want extra assurance, review or run the included scripts/deregister.py locally in a test environment before using in production.

Like a lobster shell, security has layers — review code before you run it.

latestvk97fje25veghcznp7h5dk7e90n83pyda

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments