Bgp Analysis

v0.1.1

BGP protocol analysis with peer state diagnosis, path selection verification, route filtering validation, and convergence assessment. Multi-vendor coverage f...

0· 93·1 current·1 all-time
byVahagn Madatyan@vahagn-madatyan
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The skill's name and description (BGP analysis) match the content: the files contain step-by-step, vendor-specific read-only CLI commands and FSM references. One minor inconsistency: the SKILL.md metadata declares a dependency on the 'ssh' binary (reasonable for the stated purpose), but the registry metadata above lists no required binaries — this is an oversight in declarations, not a functional mismatch.
Instruction Scope
All runtime instructions are concrete, sequential diagnostic steps using 'show'/'display' commands for Cisco/JunOS/EOS. The procedure stays within BGP troubleshooting scope and does not instruct reading unrelated system files, contacting external endpoints, or executing configuration-changing commands. The references explicitly state commands are read-only.
Install Mechanism
This is an instruction-only skill with no install spec and no code files, so nothing is written to disk or downloaded. That is the lowest-risk installation model.
Credentials
The skill itself does not request environment variables or secrets. However, practical use requires SSH/console access to network devices; therefore the agent or user must supply credentials or SSH key material outside the skill. That need is proportional to the task, but you should avoid granting broad or write-capable credentials (e.g., admin accounts) because the skill assumes only read-only access.
Persistence & Privilege
The skill does not request persistent presence (always: false), does not modify other skills or system settings, and is read-only in scope. Autonomous invocation is allowed by default but does not appear to increase risk here given the read-only instructions.
Assessment
This skill is essentially a documented runbook of read-only BGP 'show' commands and FSM reasoning — it appears coherent with that purpose. Before installing or using it: (1) confirm the agent will only be given read-only SSH access to devices (no admin/privileged credentials), (2) prefer use through a bastion/jump host or limited account so the agent cannot issue config-changing commands accidentally, (3) verify that the actual runtime environment has the 'ssh' binary available (SKILL.md expects it even though registry metadata omitted it), (4) audit logs for any connections the agent makes and restrict network reachability to intended devices, and (5) if you plan to let the agent act autonomously, limit scope and monitor outputs — the skill itself is read-only, but credentials/network access you supply determine the real risk.

Like a lobster shell, security has layers — review code before you run it.

latestvk97eazrdbmhkyg4q6dbrnz0zy183d54x

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments