Cloud Infra Automation
v1.0.0Automate provisioning and management of AWS, GCP, and Azure infrastructure using Terraform, Ansible, and CloudFormation templates.
⭐ 0· 637·8 current·8 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
The name/description (multi-cloud infra automation) aligns with the SKILL.md content, but the skill declares no required binaries, no env vars, and provides no templates or scripts. A tool that provisions AWS/GCP/Azure infrastructure would legitimately need local scripts/templates and cloud credentials; those are missing from the package metadata and file set, which is inconsistent.
Instruction Scope
SKILL.md tells the agent or user to run './cloud.sh init aws', './cloud.sh apply prod', etc., and references Terraform/Ansible and cloud CLIs. However there is no cloud.sh, no templates, and no additional instructions or safe-guards in the bundle. Instructions therefore reference non-existent files and implicitly require access to cloud credentials and privileged operations without specifying how those credentials are provided or used.
Install Mechanism
This is an instruction-only skill with no install spec and no code files, so it does not write or install artifacts on disk by itself (lower install risk). However that also means the bundle lacks the actual scripts it instructs you to run.
Credentials
The SKILL.md explicitly requires Terraform, Ansible, and AWS/GCP/Azure CLIs (which in practice require cloud credentials), but the skill metadata declares no environment variables, no primary credential, and no required config paths. The skill fails to declare any credentials it would reasonably need — a proportionality and transparency problem.
Persistence & Privilege
The skill is not marked 'always: true' and is user-invocable only. It does not request persistent privileges or modify other skills' configuration in the provided metadata. Autonomous invocation is allowed by default but is not combined with other privilege escalations in the bundle.
What to consider before installing
Do not install or run this skill as-is. Before using it, request the actual code/templates and a source repository or homepage from the author (there is none listed). Specifically: (1) ask for the cloud.sh script and all Terraform/Ansible/CloudFormation templates so you can review them; (2) verify where the skill will run commands and never run unknown scripts (like cloud.sh) on production hosts; (3) require the skill to declare required binaries and exactly which environment variables or credential mechanisms it uses (and prefer short-lived, least-privilege credentials and isolated test accounts); (4) review IaC templates for hard-coded secrets or destructive operations (destroy/prod); (5) prefer skills with a verifiable source (GitHub repo, published package) and an identified maintainer before granting any cloud credentials or executing automation. If you need this functionality, get the full source and review it or run it in an isolated sandbox with limited credentials first.Like a lobster shell, security has layers — review code before you run it.
latestvk977h9dxpck5cstev502zm2ykx828bx3
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
