Phoenix Shield

WarnAudited by ClawScan on May 10, 2026.

Overview

Review before installing: this instruction-only skill encourages high-impact production updates, rollbacks, and long-running monitoring without a reviewed or scoped implementation.

Do not rely on this for production updates until you can verify the actual phoenix-shield tool, installation source, permissions, rollback behavior, and stop controls. If you test it, start in a disposable or staging environment, require manual approval for updates and rollback, and protect any backups it creates.

Findings (6)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If followed, the agent could make broad production system changes that affect packages, services, and availability.

Why it was flagged

The skill documents high-impact system mutation through raw command strings, privileged hooks, and automatic rollback, but does not show clear approval, scoping, or safety boundaries.

Skill content
phoenix-shield deploy \
  --command "apt update && apt upgrade -y" \
  --health-check "systemctl status nginx" \
  --health-check "systemctl status mysql" \
  --pre-hook "/root/notify-start.sh" \
  --post-hook "/root/notify-complete.sh" \
  --auto-rollback
Recommendation

Require explicit user confirmation for each update and rollback, prefer dry runs first, restrict allowed commands, and test in staging before production.

What this means

Users may be led to run or install an unverified external tool to perform safety-critical backups and rollbacks.

Why it was flagged

The instructions depend on a phoenix-shield executable, but no reviewed installer, source, required binary, or package provenance is provided.

Skill content
No install spec — this is an instruction-only skill.
Recommendation

Provide a verifiable source, pinned installation instructions, required binary declarations, and implementation artifacts before relying on it for production changes.

What this means

A user or agent could over-trust the skill during critical updates and assume recovery guarantees that are not evidenced by the provided artifacts.

Why it was flagged

The skill makes strong reliability and safety claims, but the artifact set contains only documentation and no implementation that can substantiate those protections.

Skill content
**Solution:** PhoenixShield provides a complete safety net with automatic rollback when things go wrong. ... 🛡️ **Zero-Downtime** - Graceful degradation when possible
Recommendation

Treat the reliability claims as unverified until the tool is installed from a trusted source and tested against non-production systems.

What this means

The system could continue monitoring and making recovery changes after the initial update command, potentially affecting services without timely human review.

Why it was flagged

The documented configuration enables long-running monitoring and autonomous rollback behavior, but the artifacts do not define containment, stop controls, or when human approval is required.

Skill content
monitoring:
  enabled: true
  duration: 24h
...
rollback:
  strategy: smart  # smart, full, manual
  auto_rollback: true
  max_attempts: 3
Recommendation

Define explicit monitoring duration, stop commands, logging, alerting, and human approval requirements before enabling automatic rollback.

What this means

Running these workflows could require broad administrator privileges across production hosts.

Why it was flagged

The examples imply root-level local hooks and multi-server administrative access, but the registry declares no credentials, config paths, or permission boundaries.

Skill content
--pre-hook "/root/notify-start.sh" \
--post-hook "/root/notify-complete.sh" \
--target "$server"
Recommendation

Use least-privilege accounts, restrict target hosts, document required credentials, and require explicit approval before privileged or remote actions.

What this means

Sensitive configuration, database, and system information may be stored in backup locations.

Why it was flagged

Broad persistent backups are purpose-aligned for a rollback tool, but they can contain secrets, private data, and operational context.

Skill content
**Backup includes:**
- Configuration files
- Database dumps
- System state
- Process list
- Network connections
- Health metrics baseline
Recommendation

Encrypt backups, restrict file permissions, define exclusions for secrets, and verify retention and deletion behavior.