Scan Report
15 /100
vmware-vks
AI-powered VMware vSphere with Tanzu (VKS) management — 20 MCP tools for Supervisor clusters, vSphere Namespaces, and TKC cluster lifecycle
Documentation-only skill for VMware VKS management with clear, reasonable security claims and no malicious indicators; actual functionality resides in an external PyPI package.
Safe to install
The skill is low-risk but relies entirely on external package security. Consider pinning to a specific version and verifying the PyPI package hash before installation.
Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| Low | External package dependency | SKILL.md:1 |
| Low | Plaintext credential storage in .env | references/setup-guide.md:56 |
| Low | SSL verification opt-out supported | references/setup-guide.md:30 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Shell | WRITE | NONE | ✓ Aligned | SKILL.md declares Bash tool but contains no scripts; actual shell access would b… |
| Network | READ | READ | ✓ Aligned | Outbound connections limited to configured vCenter host only (per security docum… |
| Environment | NONE | READ | ✓ Aligned | Requires VMWARE_VKS_CONFIG and credential environment variables per metadata |
1 findings
Info Email 邮箱地址
[email protected] references/setup-guide.md:53 File Tree
5 files · 23.9 KB · 615 lines Markdown 4f · 577L
JSON 1f · 38L
├─
▾
evals
│ └─
evals.json
JSON
├─
▾
references
│ ├─
capabilities.md
Markdown
│ ├─
cli-reference.md
Markdown
│ └─
setup-guide.md
Markdown
└─
SKILL.md
Markdown
Dependencies 1 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
vmware-vks | * | PyPI | No | Version not pinned; external package not included in skill bundle |
Security Positives
✓ MIT-licensed with auditable source code at github.com/zw008/VMware-VKS
✓ 12/20 tools are read-only (60% read-only ratio)
✓ Dry-run defaults for all create operations
✓ Double confirmation required for destructive operations (delete_namespace, delete_tkc_cluster)
✓ Safety guards that prevent orphaned clusters and data loss
✓ No eval, exec, or subprocess calls with user-controlled data (per documentation)
✓ Network egress limited to user-configured vCenter only
✓ MCP transport uses stdio only (no listening ports)
✓ All write operations audit-logged to ~/.vmware-vks/audit.log
✓ No suspicious indicators: no base64, no direct IPs, no curl|bash patterns