PipelineLint

CI/CD pipeline anti-pattern analyzer -- detects hardcoded secrets, missing cache configs, skipped tests, unsafe deployments, no approval gates, and environment configuration issues

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "PipelineLint" with this command: npx skills add pipelinelint

PipelineLint -- CI/CD Pipeline Anti-Pattern Analyzer

PipelineLint scans codebases for CI/CD pipeline anti-patterns, hardcoded secrets, missing cache configurations, skipped tests, unsafe deployments, no approval gates, unpinned dependencies, and environment configuration issues. It uses regex-based pattern matching against 90 pipeline-specific patterns across 6 categories, lefthook for git hook integration, and produces markdown reports with actionable remediation guidance. 100% local. Zero telemetry.

Commands

Free Tier (No license required)

pipelinelint scan [file|directory]

One-shot pipeline quality scan of files or directories.

How to execute:

bash "<SKILL_DIR>/scripts/dispatcher.sh" --path [target]

What it does:

  1. Accepts a file path or directory (defaults to current directory)
  2. Discovers all source files (skips .git, node_modules, binaries, images, .min.js)
  3. Runs 30 pipeline quality patterns against each file (free tier limit)
  4. Calculates a pipeline quality score (0-100) per file and overall
  5. Grades: A (90-100), B (80-89), C (70-79), D (60-69), F (<60)
  6. Outputs findings with: file, line number, check ID, severity, description, recommendation
  7. Exit code 0 if score >= 70, exit code 1 if pipeline quality is poor
  8. Free tier limited to first 30 patterns (SE + CF categories)

Example usage scenarios:

  • "Scan my pipeline for security issues" -> runs pipelinelint scan .
  • "Check this workflow file for anti-patterns" -> runs pipelinelint scan .github/workflows/ci.yml
  • "Find hardcoded secrets in my CI config" -> runs pipelinelint scan .
  • "Audit my CI/CD pipeline configuration" -> runs pipelinelint scan .
  • "Check for missing cache configs" -> runs pipelinelint scan .

Pro Tier ($19/user/month -- requires PIPELINELINT_LICENSE_KEY)

pipelinelint scan --tier pro [file|directory]

Extended scan with 60 patterns covering secrets, caching, testing, and dependency safety.

How to execute:

bash "<SKILL_DIR>/scripts/dispatcher.sh" --path [target] --tier pro

What it does:

  1. Validates Pro+ license
  2. Runs 60 pipeline patterns (SE, CF, TS, AR categories)
  3. Detects skipped tests and disabled quality checks
  4. Identifies unsafe dependency management practices
  5. Full category breakdown reporting

pipelinelint scan --format json [directory]

Generate JSON output for CI/CD integration.

bash "<SKILL_DIR>/scripts/dispatcher.sh" --path [directory] --format json

pipelinelint scan --format html [directory]

Generate HTML report for browser viewing.

bash "<SKILL_DIR>/scripts/dispatcher.sh" --path [directory] --format html

pipelinelint scan --category SE [directory]

Filter scan to a specific check category (SE, CF, TS, AR, DP, EN).

bash "<SKILL_DIR>/scripts/dispatcher.sh" --path [directory] --category SE

Team Tier ($39/user/month -- requires PIPELINELINT_LICENSE_KEY with team tier)

pipelinelint scan --tier team [directory]

Full scan with all 90 patterns across all 6 categories including deployment safety and environment configuration.

How to execute:

bash "<SKILL_DIR>/scripts/dispatcher.sh" --path [directory] --tier team

What it does:

  1. Validates Team+ license
  2. Runs all 90 patterns across 6 categories
  3. Includes deployment safety checks (no approval gates, force push, destructive operations)
  4. Includes environment configuration checks (hardcoded values, no timeouts, plain HTTP)
  5. Full category breakdown with per-file results

pipelinelint scan --verbose [directory]

Verbose output showing every matched line and pattern details.

bash "<SKILL_DIR>/scripts/dispatcher.sh" --path [directory] --verbose

pipelinelint status

Show license and configuration information.

bash "<SKILL_DIR>/scripts/dispatcher.sh" status

Check Categories

PipelineLint detects 90 CI/CD pipeline anti-patterns across 6 categories:

CategoryCodePatternsDescriptionSeverity Range
Secrets & SecuritySE15Hardcoded passwords, API keys in YAML, tokens in logs, credentials in curl commands, SSH keys inlinehigh -- critical
Caching & PerformanceCF15No cache for npm/pip/maven, redundant installs, missing dependency caching, slow Docker buildslow -- medium
Testing & QualityTS15Skipped tests, disabled linting, no coverage enforcement, --no-verify flags, continue-on-error abusemedium -- high
Artifacts & DependenciesAR15Unpinned Docker tags, curl-to-shell, unverified downloads, disabled SSL, GitHub Actions on branch refsmedium -- high
Deployment SafetyDP15No approval gates, force push, auto-approve terraform, destructive SQL, no rollback strategyhigh -- critical
Environment & ConfigurationEN15Hardcoded localhost, no timeouts, no retries, plain HTTP URLs, hardcoded database connection stringslow -- high

Tier-Based Pattern Access

TierPatternsCategories
Free30SE, CF
Pro60SE, CF, TS, AR
Team90SE, CF, TS, AR, DP, EN
Enterprise90SE, CF, TS, AR, DP, EN + priority support

Scoring

PipelineLint uses a deductive scoring system starting at 100 (perfect):

SeverityPoint DeductionDescription
Critical-25 per findingSecurity vulnerability or deployment safety risk
High-15 per findingSignificant pipeline problem (skipped tests, insecure deps)
Medium-8 per findingModerate concern (missing caching, env misconfiguration)
Low-3 per findingInformational / best practice suggestion

Grading Scale

GradeScore RangeMeaning
A90-100Excellent pipeline configuration
B80-89Good configuration with minor issues
C70-79Acceptable but needs improvement
D60-69Poor pipeline quality
FBelow 60Critical pipeline problems
  • Pass threshold: 70 (Grade C or better)
  • Exit code 0 = pass (score >= 70)
  • Exit code 1 = fail (score < 70)

Configuration

Users can configure PipelineLint in ~/.openclaw/openclaw.json:

{
  "skills": {
    "entries": {
      "pipelinelint": {
        "enabled": true,
        "apiKey": "YOUR_LICENSE_KEY_HERE",
        "config": {
          "severityThreshold": "medium",
          "ignorePatterns": ["**/test/**", "**/fixtures/**", "**/*.test.*"],
          "ignoreChecks": [],
          "reportFormat": "text"
        }
      }
    }
  }
}

Important Notes

  • Free tier works immediately with no configuration
  • All scanning happens locally -- no code is sent to external servers
  • License validation is offline -- no phone-home or network calls
  • Pattern matching only -- no AST parsing, no external dependencies beyond bash
  • Supports scanning all file types in a single pass
  • Git hooks use lefthook which must be installed (see install metadata above)
  • Exit codes: 0 = pass (score >= 70), 1 = fail (for CI/CD integration)
  • Output formats: text (default), json, html

Error Handling

  • If lefthook is not installed and user tries hooks, prompt to install it
  • If license key is invalid or expired, show clear message with link to https://pipelinelint.pages.dev/renew
  • If a file is binary, skip it automatically with no warning
  • If no scannable files found in target, report clean scan with info message
  • If an invalid category is specified with --category, show available categories

When to Use PipelineLint

The user might say things like:

  • "Scan my CI/CD pipeline for issues"
  • "Check my GitHub Actions workflow"
  • "Find hardcoded secrets in my pipeline config"
  • "Detect unsafe deployment practices"
  • "Are there any missing cache configurations?"
  • "Check for skipped tests in my CI"
  • "Audit my pipeline security"
  • "Find unpinned dependencies in my workflow"
  • "Check for deployment safety issues"
  • "Scan for pipeline anti-patterns"
  • "Run a pipeline quality audit"
  • "Generate a pipeline quality report"
  • "Check if my Jenkinsfile has security issues"
  • "Find force push commands in my CI config"
  • "Check my GitLab CI for best practices"

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Coding

Spicy Ai Video

Turn a 60-second talking head clip into 1080p high-energy edited videos just by typing what you need. Whether it's turning bland footage into visually intens...

Registry SourceRecently Updated
Coding

Video Maker Fast

Get polished MP4 videos ready to post, without touching a single slider. Upload your video clips (MP4, MOV, AVI, WebM, up to 500MB), say something like "trim...

Registry SourceRecently Updated
Coding

Generation Generator

generate text prompts or clips into AI generated videos with this skill. Works with MP4, MOV, PNG, JPG files up to 500MB. marketers, content creators, social...

Registry SourceRecently Updated
Coding

Editor On Android

Get edited MP4 clips ready to post, without touching a single slider. Upload your video clips (MP4, MOV, AVI, WebM, up to 500MB), say something like "trim th...

Registry SourceRecently Updated