Cicd Pipeline Generator
Security checks across static analysis, malware telemetry, and agentic risk
Overview
This is a coherent CI/CD template skill with no hidden behavior, but users should review the deployment and secret-handling parts before copying the generated pipelines.
This skill appears safe to use as a CI/CD template reference. Before copying a generated workflow into a real repository, review deployment triggers, require approvals for production, restrict secrets to the minimum needed permissions, and consider pinning external CI tools or actions.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
58/58 vendors flagged this skill as clean.
Risk analysis
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If adopted as-is, a push to the main branch could publish a production deployment.
The provided GitHub Actions template would deploy to production on pushes to main once copied into a repository and configured with secrets. This is purpose-aligned for CI/CD, but it is a high-impact automated action.
on:
push:
branches: [ main, develop ]
...
deploy:
name: Deploy to Production
if: github.ref == 'refs/heads/main' && github.event_name == 'push'
...
vercel-args: '--prod'Before using the template, confirm branch protections, required environment approvals, deployment targets, and rollback procedures.
Overly broad or long-lived deployment tokens could allow unwanted changes to hosting or cloud resources if the CI workflow is misconfigured or compromised.
The skill instructs users to configure deployment and cloud credentials as CI secrets. This is expected for deployment pipelines, but those credentials can grant significant account access.
Required Secrets:
- `VERCEL_TOKEN`
- `VERCEL_ORG_ID`
- `VERCEL_PROJECT_ID`
...
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}Use least-privilege tokens, environment-scoped secrets, protected branches, and regular secret rotation.
Future changes to the external CLI package could affect deployments or build behavior.
The GitLab CI template installs the Vercel CLI from npm during deployment without pinning an exact version. This is common and purpose-aligned, but it relies on external package supply chain behavior at pipeline runtime.
- npm install -g vercel - vercel --token $VERCEL_TOKEN --prod
Pin deployment tool versions where practical and review third-party CI actions or packages before enabling production deployments.
