Aws Networking Audit

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This appears to be a coherent read-only AWS networking audit skill, but it needs scoped AWS credentials and has under-declared CLI/MCP requirements users should verify.

This skill looks appropriate for a read-only AWS VPC networking audit. Before installing or using it, confirm you are comfortable granting AWS read access, use a narrowly scoped read-only role, specify the target account/region/VPC, keep Flow Log queries time-bounded, and verify whether the declared aws-network-mcp dependency is approved in your environment.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If used with broad AWS credentials, the agent can read detailed cloud network configuration and traffic-log metadata across the granted scope.

Why it was flagged

The skill requires AWS account credentials and read-only permissions that can inspect VPC configuration, CloudWatch Flow Logs, and potentially multiple accounts; this is expected for the stated audit purpose but sensitive.

Skill content
AWS CLI v2 configured with valid credentials (`aws sts get-caller-identity` succeeds) ... IAM permissions ... `logs:FilterLogEvents`, `logs:DescribeLogGroups` ... Multi-account audits require cross-account IAM roles or AWS Organizations access
Recommendation

Use a least-privilege read-only role, limit the account/region/VPC scope, and avoid granting admin or organization-wide access unless explicitly needed.

What this means

The agent may run read-only AWS CLI commands that reveal cloud inventory, security groups, route tables, Transit Gateway routes, and Flow Log events.

Why it was flagged

The skill's main capability is to guide AWS CLI use. The commands are described as read-only and fit the audit purpose, but they still provide broad visibility into AWS networking resources and logs.

Skill content
All commands are non-modifying (`describe`, `get`, `list`, `search`, `filter`). No command creates, modifies, or deletes resources.
Recommendation

Review the commands before running them, keep queries scoped by region/VPC/log time range, and do not substitute modifying AWS commands into the workflow.

What this means

Install-time metadata may not fully warn users that the skill expects AWS tooling, credentials, network egress, and possibly an MCP connector.

Why it was flagged

The registry-level metadata under-declares requirements that SKILL.md itself declares, including AWS CLI, AWS_ACCESS_KEY_ID, Amazon egress, and an MCP dependency. This appears to be a metadata completeness issue rather than hidden behavior.

Skill content
Required binaries (all must exist): none ... Required env vars: none ... Primary credential: none ... Capability signals: No capability tags were derived.
Recommendation

Treat the SKILL.md prerequisites as authoritative and verify AWS CLI, credential, egress, and MCP requirements before enabling the skill.

What this means

If the MCP dependency is enabled, AWS networking data or tool access could be mediated by that connector.

Why it was flagged

The skill metadata declares an MCP dependency and AWS egress, but the provided artifacts do not describe that MCP server's identity, permissions, or data boundaries. No code or automatic MCP use is shown.

Skill content
"mcpDependencies":["aws-network-mcp"],"egressEndpoints":["*.amazonaws.com:443"]
Recommendation

Only enable the MCP dependency if its source and permissions are trusted, and confirm it receives only the data needed for the audit.