Scan Report
5 /100
vmware-nsx-security
VMware NSX DFW microsegmentation and security — 20 MCP tools for distributed firewall, security groups, VM tags, Traceflow, and IDPS
This is a well-documented VMware NSX security management skill with no malicious behavior, no hidden functionality, and comprehensive safety controls covering audit logging, input validation, credential handling, and dry-run modes.
Safe to install
Approve for use. The skill is a legitimate infrastructure management tool with appropriate documentation, audit controls, and no high-risk indicators.
Findings 1 items
| Severity | Finding | Location |
|---|---|---|
| Low | Bash allowed-tools declaration is broad | SKILL.md:9 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | WRITE | WRITE | ✓ Aligned | Reads/writes config.yaml, audit.db, .env (all explicitly documented) |
| Network | READ | READ | ✓ Aligned | HTTPS REST calls to NSX Manager on port 443 only (documented in SKILL.md archite… |
| Shell | WRITE | WRITE | ✓ Aligned | Bash tool scoped to CLI invocation (vmware-nsx-security doctor, policy list, etc… |
| Environment | READ | READ | ✓ Aligned | Reads VMWARE_NSX_SECURITY_*_PASSWORD and VMWARE_NSX_SECURITY_CONFIG — explicitly… |
File Tree
5 files · 27.2 KB · 825 lines Markdown 4f · 787L
JSON 1f · 38L
├─
▾
evals
│ └─
evals.json
JSON
├─
▾
references
│ ├─
capabilities.md
Markdown
│ ├─
cli-reference.md
Markdown
│ └─
setup-guide.md
Markdown
└─
SKILL.md
Markdown
Dependencies 2 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
vmware-nsx-security | * | uv tool install | No | Version not pinned in SKILL.md installer declaration |
vmware-policy | * | auto-installed dependency | No | Companion skill for audit logging, auto-installed |
Security Positives
✓ All 20 MCP tools and CLI commands fully documented with descriptions
✓ Comprehensive audit logging to ~/.vmware/audit.db via vmware-policy framework
✓ Credential safety: passwords loaded only from environment variables, never from config.yaml
✓ Input validation with safe character set enforcement documented
✓ Prompt injection defense via _sanitize() function documented
✓ Dry-run mode available for all write operations
✓ Double confirmation required for destructive operations (delete)
✓ .env file permissions validated (chmod 600) by doctor command
✓ No high-risk indicators found: no base64, no eval, no direct IP exfil, no credential harvesting
✓ No hidden functionality — all operations match documentation
✓ MCP server uses stdio transport only (local, no network listener)
✓ All NSX API calls over HTTPS port 443 to declared targets