cloud-misconfig-scannerAutomated security scanner for identifying and reporting misconfigurations across cloud infrastructure providers.
Install via ClawdBot CLI:
clawdbot install krishnakumarmahadevan-cmd/cloud-misconfig-scannerGrade Limited — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Hardcoded API key or token pattern found in skill definition
AKIAIOSFODNN...Calls external URL not in known-safe list
https://toolweb.inAudited Apr 18, 2026 · audit v1.0
Generated Apr 8, 2026
A healthcare organization uses the scanner to audit AWS and Azure environments for HIPAA compliance, identifying misconfigurations like unencrypted storage or overly permissive access controls. It automates regular reporting to demonstrate compliance to auditors and reduces manual review time.
A fintech company integrates the scanner into their CI/CD pipeline to scan cloud configurations before deployment, catching security risks like public S3 buckets or weak encryption in development and staging environments. This ensures Infrastructure-as-Code (IaC) security and prevents misconfigurations from reaching production.
An e-commerce enterprise with hybrid AWS and Google Cloud infrastructure uses the scanner for continuous monitoring to detect misconfigurations across both providers, such as exposed databases or insecure network rules. It provides a unified view of security risks and helps prioritize remediation based on severity.
A tech startup leverages the scanner to identify misconfigurations that could lead to security breaches or unnecessary costs, like orphaned resources or overly permissive IAM roles. It helps small teams maintain a secure cloud posture without dedicated security staff.
A government agency uses the scanner to ensure their Azure and Alibaba Cloud deployments comply with regulations like FedRAMP, scanning for issues such as missing logging or improper data handling. It supports automated audits and remediation tracking for accountability.
Offers tiered pricing plans (Free, Developer, Professional, Enterprise) based on usage volume, with higher tiers providing more daily and monthly scans. This model caters to diverse customer sizes from individuals to large enterprises, generating recurring revenue.
Provides the scanner as an API on platforms like RapidAPI, where users pay per scan execution without long-term commitments. This attracts developers and small businesses needing occasional audits, with revenue based on API call volume.
Sells custom enterprise licenses with features like dedicated support, higher scan limits, and integration into existing security tools. This targets large organizations requiring tailored solutions and compliance reporting, often with annual contracts.
💬 Integration Tip
Use the provided sample request format with valid credentials to quickly test scans; for production, automate scans via CI/CD tools or schedule them using cron jobs to maintain continuous security monitoring.
Scored Apr 19, 2026
Security vetting protocol before installing any AI agent skill. Red flag detection for credential theft, obfuscated code, exfiltration. Risk classification L...
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope,...
Comprehensive security auditing for Clawdbot deployments. Scans for exposed credentials, open ports, weak configs, and vulnerabilities. Auto-fix mode included.
Audit codebases and infrastructure for security issues. Use when scanning dependencies for vulnerabilities, detecting hardcoded secrets, checking OWASP top 10 issues, verifying SSL/TLS, auditing file permissions, or reviewing code for injection and auth flaws.
Audit a user's current AI tool stack. Score each tool by ROI, identify redundancies, gaps, and upgrade opportunities. Produces a structured report with score...
Detect anomalies and outliers in construction data: unusual costs, schedule variances, productivity spikes. Statistical and ML-based detection methods.