Config Management

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This is an instruction-only network configuration management skill with purpose-aligned but high-impact device commands and sensitive config backup handling.

This skill appears coherent for network configuration assurance. Before using it, ensure the operator is authorized for the target devices, require manual approval for any write or rollback command, prefer secure archive transport such as SCP, protect stored configs and golden baselines, and verify any MCP or SSH dependency before enabling it.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

#
ASI02: Tool Misuse and Exploitation
Medium
What this means

If a write command is run on the wrong device or without review, it could disrupt routing, switching, management access, or security controls.

Why it was flagged

The skill documents commands that can replace or roll back live network device configuration, including a Cisco force option that bypasses normal confirmation. The same section labels these as WRITE operations and says to confirm authorization and a maintenance window, so this is purpose-aligned but high-impact.

Skill content
⚠️ Replace with file | `configure replace flash:[file] force` | `rollback [n]` then `commit` | `configure replace flash:[file]`
Recommendation

Require explicit human approval for every write/remediation command, preview diffs before applying changes, and prefer staged or confirmed rollback mechanisms where available.

#
ASI03: Identity and Privilege Abuse
Medium
What this means

A user or agent with these privileges can view sensitive device configuration and potentially alter production network behavior.

Why it was flagged

The skill requires device access and may require privileged network configuration rights for remediation or archival. This is expected for the stated purpose, but it is sensitive authority.

Skill content
SSH or console access to the device (read-only sufficient for assessment; enable/configure privilege required for remediation or archival steps)
Recommendation

Use least-privilege accounts for read-only assessment, restrict write privileges to approved operators, and log all privileged sessions.

#
ASI06: Memory and Context Poisoning
Medium
What this means

Stored configuration backups could expose network topology, management settings, secrets, or weak credentials if kept on insecure storage or transferred over insecure protocols.

Why it was flagged

The skill instructs users to persist full device configurations and maintain multiple archives. These archives can contain sensitive network details and may become trusted baselines for later drift analysis.

Skill content
Back up the current configuration with timestamped naming... `copy running-config tftp://[server]/[hostname]-YYYYMMDD-HHMM.cfg` ... Maintain a minimum of 3 archived configs per device
Recommendation

Prefer encrypted transfer such as SCP over TFTP/FTP, restrict archive access, redact or protect secrets, and validate golden baselines against an approved source.

#
ASI04: Agentic Supply Chain Vulnerabilities
Low
What this means

A user may not realize an external MCP integration or local SSH client could be needed if the registry metadata is the only information they review.

Why it was flagged

Nested metadata declares an ssh requirement and a git-netops-mcp dependency, while the registry summary says there are no required binaries and no install spec. There is no code or automatic install shown, so this is a review-context note rather than evidence of unsafe execution.

Skill content
openclaw: '{"emoji":"🔧","safetyTier":"read-write","requires":{"bins":["ssh"],"env":[]},"tags":["config","backup","drift"],"mcpDependencies":["git-netops-mcp"],"egressEndpoints":[]}'
Recommendation

Verify whether git-netops-mcp is actually required, review its provenance before enabling it, and align registry requirements with the SKILL.md metadata.