ZappushZappush
SkillsUse CasesBenchmarkCommunitySign In
      Back to Skills
      jame-mei-ltp

      Safety Report

      AIOps Agent

      @jame-mei-ltp

      AI-driven intelligent operations system for proactive monitoring, intelligent diagnosis, and automated remediation. Use for AIOps tasks, SRE automation, or i...

      200Downloads
      0Installs
      3Stars
      2Versions
      Workflow Automation3,323Browser Automation1,737Video & Audio1,618Monitoring & Logging1,579

      Security Analysis

      medium confidence
      Suspicious0.08 risk

      The repository broadly matches an AIOps agent (collectors, detectors, executors), but the package metadata and runtime instructions disagree about what the skill needs and the code contains powerful execution paths (K8s/Ansible/webhooks) that warrant caution before installing or granting credentials.

      Feb 25, 202692 files5 concerns
      Purpose & Capabilitynote

      The name/description match the included source: collectors, anomaly detection, RCA, action planners, and executors (K8s, K8s-cluster, Ansible, HTTP) are present and coherent with an AIOps/SRE automation tool. However the skill registry metadata claims 'instruction-only' / no env vars required while the repo and SKILL.md clearly expect many external integrations (LLM keys, K8s, vector DB, webhooks, MySQL/Redis optional). That metadata mismatch is suspicious but could be sloppy publishing rather than malicious misdirection.

      Instruction Scopeconcern

      SKILL.md instructs cloning, pip installing dependencies, running docker-compose/make, and setting environment variables (OPENAI/ANTHROPIC keys, WEBHOOK_URL, KUBECONFIG, etc.). Those runtime actions are expected for this project, but they ask the agent/user to supply secrets and to run commands that start services which can perform cluster-level operations. The instructions do not declare the full set of env vars or warn explicitly about the high privileges needed for the executors. The SKILL.md does not try to read unrelated system files, but it assumes access to kubeconfigs and credentials which broaden the attack surface.

      Install Mechanismnote

      There is no remote-download install spec — the repo provides Docker Compose, a Dockerfile reference, requirements.txt, and standard Python install steps. No suspicious external URLs or archive extracts are present in the manifest. The lack of an official homepage, unknown source, and a direct Dockerfile/docker-compose workflow means users will build/run code locally; verify the Dockerfile and image builds before running.

      Credentialsconcern

      Registry metadata lists no required env vars/credentials, but the SKILL.md and config files expect multiple sensitive keys and endpoints (ANTHROPIC/OPENAI API key, QDRANT URL/key, LARK app_secret/encrypt_key, KUBECONFIG or in-cluster permissions, MySQL/Redis credentials, webhooks, PagerDuty). Those are plausible for an AIOps agent, but the skill should have declared the required secrets up front — the omission is an inconsistency and increases risk. The number and sensitivity of variables are high relative to a simple 'skill' install.

      Persistence & Privilegeconcern

      The skill is not marked always:true, and model invocation is allowed (normal). The real concern is the code's capabilities: k8s cluster-level executors (node cordon/drain), PVC snapshot/expand, Ansible executor, and HTTP executors can perform destructive or high-impact operations if given credentials with broad privileges. If you run this agent or grant it cluster-admin / high-permission credentials, it could autonomously modify infrastructure. Treat autonomous execution + powerful execution backends as high-risk unless you enforce least-privilege and manual approvals.

      Guidance

      This repo appears to implement a full AIOps agent and therefore legitimately requires sensitive credentials (LLM keys, Kubernetes credentials, vector DB and webhook secrets). However: 1) the registry metadata claims no env/installs while the code and SKILL.md ask for many secrets — that mismatch is a red flag; 2) the code includes executors that can run Ansible and perform node-level K8s operations — don't give cluster-admin or root credentials. Before installing: review the Dockerfile and entrypoint, run in an isolated sandbox or test cluster, create least-privilege service accounts (restrict K8s verbs and namespaces), avoid exposing production kubeconfigs, rotate any keys you provide, and audit webhook/callback endpoints. If provenance (author, homepage, organization) is unknown, prefer local code review and manual testing rather than granting the agent autonomous access in production.

      Latest Release

      v1.0.1

      增加k8s ansible rag lark审批

      Popular Skills

      Real Estate Intelligence

      @James-southendsolutions · 6 stars

      Location Context

      @James-southendsolutions · 2 stars

      Ev Charger Locations

      @James-southendsolutions · 2 stars

      Fitness Finder Locations

      @James-southendsolutions · 2 stars

      Hotel Finder Location

      @James-southendsolutions · 2 stars

      Journey Planning with Waypoints

      @James-southendsolutions · 2 stars

      Published by @jame-mei-ltp on ClawHub

      Zappush© 2026 Zappush
      HomeGuaranteeSupport

      Something feels unusual? We want to help: [email protected]