AI-driven intelligent operations system for proactive monitoring, intelligent diagnosis, and automated remediation. Use for AIOps tasks, SRE automation, or i...
Security Analysis
medium confidenceThe repository broadly matches an AIOps agent (collectors, detectors, executors), but the package metadata and runtime instructions disagree about what the skill needs and the code contains powerful execution paths (K8s/Ansible/webhooks) that warrant caution before installing or granting credentials.
The name/description match the included source: collectors, anomaly detection, RCA, action planners, and executors (K8s, K8s-cluster, Ansible, HTTP) are present and coherent with an AIOps/SRE automation tool. However the skill registry metadata claims 'instruction-only' / no env vars required while the repo and SKILL.md clearly expect many external integrations (LLM keys, K8s, vector DB, webhooks, MySQL/Redis optional). That metadata mismatch is suspicious but could be sloppy publishing rather than malicious misdirection.
SKILL.md instructs cloning, pip installing dependencies, running docker-compose/make, and setting environment variables (OPENAI/ANTHROPIC keys, WEBHOOK_URL, KUBECONFIG, etc.). Those runtime actions are expected for this project, but they ask the agent/user to supply secrets and to run commands that start services which can perform cluster-level operations. The instructions do not declare the full set of env vars or warn explicitly about the high privileges needed for the executors. The SKILL.md does not try to read unrelated system files, but it assumes access to kubeconfigs and credentials which broaden the attack surface.
There is no remote-download install spec — the repo provides Docker Compose, a Dockerfile reference, requirements.txt, and standard Python install steps. No suspicious external URLs or archive extracts are present in the manifest. The lack of an official homepage, unknown source, and a direct Dockerfile/docker-compose workflow means users will build/run code locally; verify the Dockerfile and image builds before running.
Registry metadata lists no required env vars/credentials, but the SKILL.md and config files expect multiple sensitive keys and endpoints (ANTHROPIC/OPENAI API key, QDRANT URL/key, LARK app_secret/encrypt_key, KUBECONFIG or in-cluster permissions, MySQL/Redis credentials, webhooks, PagerDuty). Those are plausible for an AIOps agent, but the skill should have declared the required secrets up front — the omission is an inconsistency and increases risk. The number and sensitivity of variables are high relative to a simple 'skill' install.
The skill is not marked always:true, and model invocation is allowed (normal). The real concern is the code's capabilities: k8s cluster-level executors (node cordon/drain), PVC snapshot/expand, Ansible executor, and HTTP executors can perform destructive or high-impact operations if given credentials with broad privileges. If you run this agent or grant it cluster-admin / high-permission credentials, it could autonomously modify infrastructure. Treat autonomous execution + powerful execution backends as high-risk unless you enforce least-privilege and manual approvals.
Guidance
This repo appears to implement a full AIOps agent and therefore legitimately requires sensitive credentials (LLM keys, Kubernetes credentials, vector DB and webhook secrets). However: 1) the registry metadata claims no env/installs while the code and SKILL.md ask for many secrets — that mismatch is a red flag; 2) the code includes executors that can run Ansible and perform node-level K8s operations — don't give cluster-admin or root credentials. Before installing: review the Dockerfile and entrypoint, run in an isolated sandbox or test cluster, create least-privilege service accounts (restrict K8s verbs and namespaces), avoid exposing production kubeconfigs, rotate any keys you provide, and audit webhook/callback endpoints. If provenance (author, homepage, organization) is unknown, prefer local code review and manual testing rather than granting the agent autonomous access in production.
Latest Release
v1.0.1
增加k8s ansible rag lark审批
Popular Skills
Real Estate Intelligence
@James-southendsolutions · 6 stars
Location Context
@James-southendsolutions · 2 stars
Ev Charger Locations
@James-southendsolutions · 2 stars
Fitness Finder Locations
@James-southendsolutions · 2 stars
Hotel Finder Location
@James-southendsolutions · 2 stars
Journey Planning with Waypoints
@James-southendsolutions · 2 stars
Published by @jame-mei-ltp on ClawHub