CLS CLI

WarnAudited by ClawScan on May 10, 2026.

Overview

This appears to be a real Tencent Cloud CLS management CLI, but it needs review because it gives the agent broad cloud-changing authority and installs or updates executable code from GitHub.

Install only if you trust the GitHub source and publisher. Use a dedicated least-privilege Tencent Cloud CAM key, avoid `-y` unless you are sure, require confirmation for create/delete/raw API actions, review LogListener and collector paths before enabling them, and verify upgrades before replacing the CLI binary.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the agent misunderstands a request or is influenced by bad input, it could perform high-impact CLS API actions, including changes not covered by the safer shortcut commands.

Why it was flagged

The generic API command forwards any action name and JSON parameters supplied by the user or agent to Tencent CLS, with no local action allowlist or confirmation logic in this command path.

Skill content
action := args[0] ... result, err := clsClient.CallRaw(action, params)
Recommendation

Require explicit user approval for raw API and mutating operations, prefer `--dry-run` first, restrict credentials with least-privilege CAM policies, and consider adding allowlists or confirmations for dangerous actions.

What this means

A broadly permissioned Tencent Cloud key could let the agent read logs and change CLS resources across the account or region.

Why it was flagged

The skill requires Tencent Cloud API credentials, which is expected for a CLS management tool but grants account authority according to the permissions on those keys.

Skill content
cls-cli config init --secret-id <SECRET_ID> --secret-key <SECRET_KEY> --region ap-guangzhou
Recommendation

Use a dedicated least-privilege Tencent Cloud CAM key limited to the intended CLS resources and regions, and avoid using account-wide administrator keys.

What this means

A compromised or unexpected upstream release could replace the CLI that later uses the user's Tencent Cloud credentials.

Why it was flagged

The upgrade flow downloads a release asset, marks it executable, and replaces the current binary, potentially with sudo, without visible checksum, signature, or pinned-version verification.

Skill content
resp, err := client.Get(downloadURL) ... os.Chmod(tmpPath, 0755) ... sudoCmd := exec.Command("sudo", "cp", tmpPath, currentBin)
Recommendation

Install from a trusted, pinned release; verify checksums or signatures before upgrading; and avoid running `cls-cli upgrade` in sensitive environments unless the source is audited.

What this means

Log collection services may continue running on hosts and sending configured logs until stopped or uninstalled.

Why it was flagged

The skill can install and control LogListener components that may keep running after the immediate CLI task, which is normal for log collection but persistent.

Skill content
cls-cli ll +install ... cls-cli ll +start ... cls-cli ll +stop / +restart / +status / +check / +uninstall
Recommendation

Review generated LogListener installation scripts and only start or bind collectors on intended machines; verify uninstall/stop behavior when no longer needed.

What this means

Downloaded or displayed logs could expose secrets, personal data, or adversarial log messages to the agent or local files.

Why it was flagged

The skill retrieves and can write operational log content, which may include sensitive data or untrusted text that an agent should not treat as instructions.

Skill content
cls-cli log +search ... cls-cli log +download --topic-id <id> --query "*" --from "1 hour ago" --output logs.json
Recommendation

Limit searches to necessary topics and time ranges, protect downloaded log files, redact sensitive data where possible, and do not treat log contents as agent instructions.