Cisco IOS-XE and NX-OS device health check and triage procedure. Use when troubleshooting Cisco routers, switches, or Nexus platforms — assessing CPU, memory...
Security Analysis
high confidenceThe skill is a read-only, instruction-only Cisco device triage checklist that is internally consistent with its stated purpose (device health checks) and does not request extra binaries, credentials, installs, or external endpoints.
The skill's name and description match the runtime instructions: it is a procedural playbook for IOS‑XE and NX‑OS health checks using only read-only 'show' commands. Minor metadata inconsistency: the SKILL.md's embedded openclaw metadata lists 'ssh' as a required binary, while the registry metadata for this upload lists no required binaries — expecting SSH/console access is reasonable for this purpose, but the mismatch should be resolved.
All runtime instructions are read-only 'show' commands and platform-local diagnostics (version, cpu, memory, interfaces, logs, crash cores). This stays within the stated triage scope. Note: 'show logging', 'dir crashinfo:', and 'show cores' can surface sensitive operational data and crash dumps from the device; that is expected for triage but may expose sensitive information to the agent executing the commands.
Instruction-only skill with no install spec and no code files. Nothing will be downloaded or written to disk by the skill package itself.
The skill declares no required environment variables or credentials. It assumes the operator (or agent) has SSH/console access to the target devices — this is proportional to the stated purpose. There is no request for unrelated cloud or service credentials.
always:false and default model-invocation behavior. The skill does not request persistent/system-wide privileges or to modify other skills; no elevated persistence is requested.
Guidance
This skill is a read-only checklist for Cisco IOS‑XE and NX‑OS health checks and appears coherent for that purpose, but consider the following before use: - The agent or environment that runs these instructions must have network/SSH or console access and credentials to the devices; the skill itself does not manage credentials. Only provide those credentials in secure, controlled ways. - The commands will return device-internal data (logs, crash dumps, routing tables, interface counters) which can contain sensitive info — ensure the outputs are handled appropriately and not exfiltrated to untrusted destinations. - Resolve the small metadata mismatch (SKILL.md notes 'ssh' as a required binary while registry lists none) so callers know whether an 'ssh' client must be present. - Test the procedure on non-production devices first to validate command compatibility with your exact IOS‑XE/NX‑OS versions and hardware before running in production. - If you plan to let an autonomous agent run this skill, restrict which devices it can reach and audit command outputs and access logs regularly.
Latest Release
v1.0.0
Initial release of Cisco device health check and triage skill. - Provides structured procedures for assessing Cisco IOS-XE and NX-OS device health, covering routers, switches, and Nexus platforms. - Includes platform-specific commands, decision trees, and severity thresholds for CPU, memory, interface, routing, and environmental health. - Supports QFP/RP architecture on IOS-XE and VDC isolation on NX-OS. - Outputs prioritized findings reports with recommended actions. - Designed for audit, troubleshooting, post-upgrade checks, incident response, and capacity planning.
Popular Skills
Published by @vahagn-madatyan on ClawHub