Vmware Harden

PassAudited by VirusTotal on May 8, 2026.

Overview

Type: OpenClaw Skill Name: vmware-harden Version: 1.5.22 The vmware-harden skill is a compliance auditing and drift detection tool for VMware environments. It implements a modular security architecture that separates data collection (delegated to vmware-aiops) and remediation execution (delegated to vmware-pilot), ensuring its own MCP tools remain read-only relative to the managed infrastructure. The documentation (SKILL.md, setup-guide.md) demonstrates security-conscious design through evidence sanitization, audit logging via vmware-policy, and clear boundaries for LLM-driven remediation advice.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

You would be trusting an externally installed CLI/MCP package to handle VMware compliance data.

Why it was flagged

The runnable binary is external to the reviewed artifact set, so the static scan could not inspect the package implementation that will perform scans.

Skill content
Source: unknown; Homepage: none ... Required binaries (all must exist): vmware-harden ... No code files present — this is an instruction-only skill.
Recommendation

Install only from a trusted package/source, verify the claimed GitHub/PyPI provenance, and pin or control the package version in managed environments.

What this means

A scan can read inventory, settings, and security posture from VMware/NSX environments reachable by the upstream skills.

Why it was flagged

The skill relies on existing credentialed VMware/NSX collector configurations, which is expected for this purpose but still grants access to sensitive infrastructure information.

Skill content
`vmware-harden` itself **never** opens a vSphere or NSX session — it reuses the collectors and credentials owned by the upstream skills ... All vSphere / NSX authentication lives in the upstream skills (`~/.vmware-aiops/.env`, `~/.vmware-nsx-security/.env`, etc.)
Recommendation

Use least-privilege read-only upstream accounts where possible and confirm the selected target name before scanning production environments.

What this means

Repeated or accidental scans could create load on vCenter/NSX collectors and update the local compliance database.

Why it was flagged

The scan tool is read-only to VMware resources, but it can trigger live API collection and local writes from within an agent workflow.

Skill content
`scan_target` ... performs heavy network I/O ... walks the upstream `vmware-aiops` collectors against the live vCenter / NSX ... Agents should not call this in tight loops
Recommendation

Run scans only for user-approved targets and baselines, avoid automatic retry loops, and use cached `list_violations`/reports for follow-up questions.

What this means

The local DuckDB may reveal infrastructure configuration, violations, drift history, and suggested fixes if exposed.

Why it was flagged

Compliance evidence and remediation suggestions are persisted locally and can be reused by later commands or agent sessions.

Skill content
`~/.vmware-harden/twin.duckdb` | Twin store: snapshots, violations, drift, suggestions | First `scan`
Recommendation

Protect `~/.vmware-harden/` with appropriate file permissions, avoid sharing the database unintentionally, and review retention practices.

What this means

Security posture details from violations may leave the local environment during advice generation.

Why it was flagged

When enabled, remediation advice can involve sending structured compliance evidence to an external LLM provider.

Skill content
Optional: `ANTHROPIC_API_KEY` if you want real LLM advice ... No outbound network calls beyond ... Optional `api.anthropic.com` calls when `ANTHROPIC_API_KEY` is set and the user invokes `advise`.
Recommendation

Do not set `ANTHROPIC_API_KEY` or run `advise` on sensitive findings unless external LLM processing is allowed by your organization.

NoteMedium Confidence
ASI08: Cascading Failures
What this means

Following the remediation workflow can lead to host or firewall changes performed by other skills.

Why it was flagged

The cross-skill documentation shows that findings can feed into remediation workflows through vmware-pilot and sibling skills, which can affect live infrastructure after approval.

Skill content
`vmware-harden apply --violation-id <vid>` ... pilot creates a Workflow ... invokes `vmware-aiops` MCP tool ... `vmware-aiops applies the change`
Recommendation

Keep remediation execution separated from scanning, require human approval, and review the generated execution plan before allowing vmware-pilot or sibling skills to apply changes.