โ๏ธ
Category
โ๏ธDevOps & Cloud
Author
hashicorp
Last Updated
Unknown
Source
โกVoltAgent
๐Security Analysis
Risk ScoreHigh Risk
Safe6/10Risky
Required Permissions
โจ๏ธ
Shell Access
Can execute shell commands
๐
File System
Can read/write files
๐
Network
Can make network requests
๐
Credentials
Handles API keys or secrets
Security Notes
Boundary controls access to critical infrastructure.
Significant system access, use with caution
Source Code
View on GitHubRelated Skills
Datadog Monitoring
@winor30 ยท DevOps & Cloud
Medium Risk
Access to logs, traces, metrics, incidents, and dashboards from Datadog
DevOps & Cloud
โcloud-function-generator
@jeremylongshore ยท DevOps & Cloud
Low Risk
Code/content generation for cloud function
DevOps & Cloud
โaws & azure multi-cloud expert
@krosebrook ยท DevOps & Cloud
Medium Risk
Expert-level guidance for aws & azure multi cloud development
DevOps & Cloud
โExplore More Skills
Discover hundreds more Claude Code skills with security analysis.
Browse All Skills