Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Devops Pipeline Management
v1.0.0Expert for DevOps pipeline management, handling the complete lifecycle of pipelines on the quality and efficiency platform. Core capabilities: 1) Workspace m...
⭐ 0· 107·0 current·0 all-time
byzzh@zhaizhanhui
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The name, description, documentation and included Python scripts all align with a DevOps pipeline management skill that talks to a platform BFF / OpenAPI. That capability matches the stated purpose. However the registry metadata claims 'Required env vars: none' while SKILL.md explicitly requires DEVOPS_DOMAIN_ACCOUNT and DEVOPS_BFF_URL (and suggests saving them to shell rc), which is an incoherence between declared requirements and the runtime instructions.
Instruction Scope
SKILL.md instructs the agent/user to set environment variables and persist them in shell config files, to run bundled Python scripts (python -m scripts/main) and optionally create a sudo symlink into /usr/local/bin. It also references cross-skill behavior (must call 'pipeline-run' skill) and many API endpoints under the platform host. The instructions do not declare an API bearer token variable even though some example API calls in the docs show 'Authorization: Bearer {token}', creating ambiguity about what secrets are required. Persisting credentials without reviewing code and executing bundled scripts that perform network calls are scope concerns.
Install Mechanism
There is no automated install spec (lowest automatic risk). However the repo contains many Python scripts and a requirements.txt — running them will execute code from this bundle. The documentation suggests creating a symlink with sudo, which elevates local impact if you follow it. Because execution is manual, risk is lower than an automatic remote download, but the presence of runnable code means users must inspect it before executing.
Credentials
SKILL.md asks for DEVOPS_DOMAIN_ACCOUNT and DEVOPS_BFF_URL (reasonable for a platform integration) and optional INTERACTIVE_MODE. But the registry metadata lists no required env vars (mismatch). Additionally, some example API requests in the docs include an Authorization Bearer token, yet SKILL.md does not declare a corresponding environment variable (e.g., DEVOPS_API_TOKEN). This omission makes it unclear whether a sensitive bearer token or other credentials are needed by the scripts, which is disproportionate to what's declared.
Persistence & Privilege
The skill does not request always:true or other elevated platform privileges. It does recommend persisting environment variables to shell rc and optionally creating a system symlink with sudo — these are ordinary user actions but increase persistence and local impact if performed without code review. The skill does not appear to modify other skills or global agent configs.
What to consider before installing
This package looks like a legitimate DevOps pipeline tool, but treat it cautiously before running anything. Points to consider:
- Metadata vs runtime mismatch: The registry entry lists no required env vars, but SKILL.md requires DEVOPS_DOMAIN_ACCOUNT and DEVOPS_BFF_URL (and the docs show Authorization: Bearer {token} in examples). Ask the provider which exact credentials/tokens are needed and why they're not declared in metadata.
- Inspect code before execution: The bundle includes many runnable Python scripts. Search the code for network calls, hardcoded endpoints, and any code that reads files or environment variables (grep for requests.post/get, os.environ, open, subprocess, 'Authorization', 'Bearer').
- Don't persist secrets to your shell until you know what is required: if an API token or sensitive credential is needed, prefer supplying it in a controlled way (runtime prompt, secure vault) rather than adding it to ~/.bashrc/.zshrc.
- Run in an isolated environment first: If you want to test, run the scripts in a disposable VM or container without sensitive credentials and monitor outbound network traffic to confirm endpoints.
- Be cautious with sudo symlink: Creating a system symlink via sudo increases risk; you can invoke scripts directly with python -m scripts/main instead.
- If you plan to use this in production, request provenance: who maintains this skill, where the endpoints point (company internal vs public), and whether the code has been audited.
If you want, I can (1) search the provided code for instances of 'Authorization', 'Bearer', 'os.environ', 'requests.', 'subprocess' to identify where secrets or external calls are used, or (2) produce a short checklist of exact grep commands to run locally to inspect the bundle.Like a lobster shell, security has layers — review code before you run it.
latestvk9734tbq0s9dfbadmrtrwnqhd5833f8t
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
