Skip to main content

Anyscale agent skills security

Anyscale agent skills security

Anyscale agent skills enforce safety policies that the agent can't bypass. This page describes the permissions model, blocked commands, credential handling, and data privacy considerations. For the license terms that govern your use of the skills, see Anyscale agent skills terms and conditions.

Security acknowledgment

On first use, the agent surfaces the full security policy and requires you to type I accept before it performs any actions. This one-time gate ensures you understand the permissions and risks involved, including shell and filesystem access, potential cloud costs, and credential exposure.

Confidentiality and third-party sharing

Don't disclose, distribute, or share Anyscale agent skills or their contents with any third party without prior written consent from Anyscale.

Scoped permissions

Each skill operates at a specific privilege level. /anyscale-platform-inspect and /anyscale-platform-ask are strictly read-only. Only /anyscale-platform-fix and /anyscale-platform-run can launch workloads, and they declare this upfront.

The following table summarizes the permissions for each skill:

SkillReads codeWrites codeExecutes shellLaunches workloads
/anyscale-workload-llm-servingYesYesYesNo
/anyscale-workload-ray-serveYesYesYesNo
/anyscale-workload-ray-dataYesYesYesNo
/anyscale-workload-batch-embeddingYesYesYesNo
/anyscale-workload-ray-trainYesYesYesNo
/anyscale-platform-askYesNoYes (read-only CLI)No
/anyscale-platform-runYesYesYesYes
/anyscale-platform-inspectYesNoYes (read-only CLI)No
/anyscale-platform-fixYesYesYesYes
/anyscale-infra-kubernetesYesYesYesNo
/anyscale-infra-aws-vmYesYesYesNo
/anyscale-infra-gcp-vmYesYesYesNo

/anyscale-platform-fix and /anyscale-platform-run can create Anyscale workspaces, jobs, and services on your cloud account. These resources incur real costs and consume real compute, including GPUs, CPUs, and memory. The infrastructure skills can provision cloud resources such as VPCs, IAM roles, and storage that may also incur costs. Always review what the agent proposes before confirming.

Destructive command blocking

Pre-tool-use hooks screen every shell command and deny dangerous operations. The hooks reduce risk but don't eliminate it. They only cover explicitly listed patterns. Treat them as a defense-in-depth layer, not a substitute for human oversight.

The skills block the following categories of commands:

CategoryBlocked commands
Shellrm -r, mkfs, dd, shutdown, reboot, poweroff, fork bombs, block device writes, piped remote execution such as curl | bash, chmod -R 777.
AWS CLIDestructive commands across EC2, S3, EKS, EFS, CloudFormation, IAM, RDS, ECR, Secrets Manager, and MemoryDB, such as terminate-instances, delete-vpc, delete-cluster, s3 rb, and delete-role.
Google Cloud CLIDestructive commands across GKE, Compute, IAM, Storage, Filestore, and Projects, such as clusters delete, instances delete, service-accounts delete, and buckets delete.
Azure CLIDestructive commands across AKS, Resource Groups, VMs, Storage, and Role assignments, such as aks delete, group delete, vm delete, and storage account delete.
Terraform, Terragrunt, and OpenTofuAllowlist approach: the skills only permit version, show, output, validate, fmt, state list, and state show. The skills block all state-mutating commands: init, plan, apply, and destroy.
Helmhelm uninstall, helm delete. The infrastructure skills permit helm upgrade --install.
kubectl and eksctlkubectl delete, kubectl drain, kubectl cordon, kubectl exec, eksctl delete. Read-only commands such as get, describe, and logs remain available.
Anyscale CLIanyscale cloud delete. The skills permit all other subcommands.

Infrastructure artifacts

The infrastructure skills generate and modify the following types of files that can directly provision or alter cloud resources:

ArtifactSkillsPurpose
Terraform configurations: .tf, .tfvars, tfplanAll infrastructure skillsProvision VPCs, IAM roles, storage, security groups, and more.
Shell scripts: .shAll infrastructure skillsSession setup, cloud registration commands, long CLI invocations.
YAML configs: cloud_resource.yaml/anyscale-infra-aws-vm, /anyscale-infra-gcp-vmAttach resources to an Anyscale cloud through anyscale cloud resource create.
Helm values: values.yaml/anyscale-infra-kubernetesConfigure and install the Anyscale operator, ingress controllers, and device plugins.
EKS cluster configs: eksctl-cluster-config.yaml/anyscale-infra-kubernetes on AWSCreate EKS clusters through eksctl.
warning

AI agents can produce infrastructure configurations that are syntactically valid but semantically dangerous. For example, Terraform security groups that allow 0.0.0.0/0 ingress, IAM policies with * resource grants, or Helm values that turn off authentication. Always review generated files line by line, run terraform plan to inspect planned changes, and test in a non-production environment first.

Credential exposure

Skills rely on your local Anyscale CLI session from anyscale login and any cloud credentials configured on your machine. The AI agent inherits whatever permissions those credentials grant. Use scoped IAM roles with the minimum permissions required, don't store long-lived root or admin credentials on workstations used with AI agents, and rotate credentials regularly.

LLM provider data handling

Anyscale doesn't collect, store, or use your data for training. The Anyscale agent skills CLI downloads skill definitions to your local machine and doesn't transmit your code, prompts, or outputs to Anyscale.

When you use skills through an AI coding tool, the tool sends your prompts, code, configurations, and command outputs to the LLM provider powering it, such as Anthropic for Claude Code or various providers for Cursor. The tool may transmit any content the agent processes, including source code, shell command outputs that may contain secrets or tokens, Anyscale workload logs, and dataset samples.

Use enterprise or API plans that offer contractual guarantees against using your data for training. Enable privacy mode if your tool offers one. Don't paste or reference secrets, PII, PHI, or regulated data in prompts or files the agent reads.

Network and access control

/anyscale-platform-fix and /anyscale-platform-run can launch Anyscale services that create publicly accessible endpoints unless you explicitly configure network restrictions. Always set up authentication, API keys, and network policies for any deployed service. The infrastructure skills can modify cloud networking configurations such as VPCs, security groups, and firewall rules. Review proposed changes to ensure they don't inadvertently open network access.