Alicloud Security Cloudfw
Automate Aliyun Cloud Firewall rule management and security posture optimization using Cinience's alicloud-security-cloudfw skill.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add alicloud-security-cloudfw npx -- -y @trustedskills/alicloud-security-cloudfw
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"alicloud-security-cloudfw": {
"command": "npx",
"args": [
"-y",
"@trustedskills/alicloud-security-cloudfw"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
The alicloud-security-cloudfw skill enables AI agents to manage Alibaba Cloud Security Center firewall configurations directly through code. It automates the creation, modification, and deletion of cloud firewall rules to enforce network security policies without manual console interaction.
When to use it
- Enforcing strict ingress and egress traffic rules for new production workloads upon deployment.
- Automating compliance updates by modifying firewall policies to match changing regulatory requirements.
- Rapidly isolating compromised instances by revoking specific IP access during a security incident.
- Standardizing network segmentation across multiple VPCs using consistent rule templates.
Key capabilities
- Create new cloud firewall rules with defined source and destination CIDR blocks.
- Modify existing firewall policies to update action types (allow/deny) or priority levels.
- Delete obsolete or temporary firewall rules to reduce attack surface.
- Integrate directly into CI/CD pipelines for infrastructure-as-code workflows.
Example prompts
"Create a cloud firewall rule that allows inbound HTTPS traffic from anywhere on port 443." "Update the default security group policy to deny all outbound traffic to non-standard ports." "Delete the temporary debug firewall rule associated with instance ID i-12345678."
Tips & gotchas
Ensure your AI agent has the necessary RAMRole permissions attached before attempting to modify firewall configurations. Always test rule changes in a staging environment first, as incorrect firewall policies can inadvertently lock out legitimate access or expose sensitive resources.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.