Skip to main content

clay-incident-runbook

Facilitates rapid incident response for Clay outages, including triage, mitigation, and postmortem procedures.

Install this skill

or
34/100

Security score

The clay-incident-runbook skill was audited on May 12, 2026 and we found 30 security issues across 3 threat categories. Review the findings below before installing.

Categories Tested

Security Issues

medium line 44

Template literal with variable interpolation in command context

SourceSKILL.md
44```bash
medium line 55

Curl to non-GitHub URL

SourceSKILL.md
55curl -s -o /dev/null -w "clay.com: HTTP %{http_code}\n" https://www.clay.com
medium line 6

Webhook reference - potential data exfiltration

SourceSKILL.md
6Use when Clay enrichments stop working, webhook delivery fails,
medium line 29

Webhook reference - potential data exfiltration

SourceSKILL.md
29Rapid response procedures for Clay-related production incidents. Clay is a hosted SaaS platform, so incidents fall into two categories: (1) Clay-side issues (platform outage, provider degradation) and
medium line 35

Webhook reference - potential data exfiltration

SourceSKILL.md
35| P1 | Complete data flow stopped | < 15 min | Credits exhausted, webhook URL expired, Clay outage |
medium line 37

Webhook reference - potential data exfiltration

SourceSKILL.md
37| P3 | Minor impact | < 4 hours | Single provider down, intermittent webhook failures |
low line 58

Webhook reference - potential data exfiltration

SourceSKILL.md
58# 2. Test webhook delivery
low line 59

Webhook reference - potential data exfiltration

SourceSKILL.md
59echo "--- Webhook Test ---"
low line 60

Webhook reference - potential data exfiltration

SourceSKILL.md
60if [ -n "${CLAY_WEBHOOK_URL:-}" ]; then
low line 61

Webhook reference - potential data exfiltration

SourceSKILL.md
61WEBHOOK_CODE=$(curl -s -o /dev/null -w "%{http_code}" \
low line 62

Webhook reference - potential data exfiltration

SourceSKILL.md
62-X POST "$CLAY_WEBHOOK_URL" \
low line 65

Webhook reference - potential data exfiltration

SourceSKILL.md
65echo "Webhook: HTTP $WEBHOOK_CODE"
low line 66

Webhook reference - potential data exfiltration

SourceSKILL.md
66if [ "$WEBHOOK_CODE" = "200" ]; then echo " -> Webhook OK"; fi
low line 67

Webhook reference - potential data exfiltration

SourceSKILL.md
67if [ "$WEBHOOK_CODE" = "404" ]; then echo " -> ISSUE: Webhook URL invalid/expired"; fi
low line 68

Webhook reference - potential data exfiltration

SourceSKILL.md
68if [ "$WEBHOOK_CODE" = "429" ]; then echo " -> ISSUE: Rate limited"; fi
low line 70

Webhook reference - potential data exfiltration

SourceSKILL.md
70echo "CLAY_WEBHOOK_URL not set!"
low line 109

Webhook reference - potential data exfiltration

SourceSKILL.md
109├── Is the webhook accepting data? (Test with curl)
low line 110

Webhook reference - potential data exfiltration

SourceSKILL.md
110│ ├── NO: Re-create webhook (50K limit may be hit) → P1
medium line 127

Webhook reference - potential data exfiltration

SourceSKILL.md
127**P1: Webhook URL Expired (50K Limit)**
low line 129

Webhook reference - potential data exfiltration

SourceSKILL.md
1291. Check: Table > + Add > Webhooks — does existing webhook show "limit reached"?
low line 130

Webhook reference - potential data exfiltration

SourceSKILL.md
1302. Fix: Create new webhook on same table
low line 131

Webhook reference - potential data exfiltration

SourceSKILL.md
1313. Update: Change CLAY_WEBHOOK_URL in all deployment secrets
low line 132

Webhook reference - potential data exfiltration

SourceSKILL.md
1324. Verify: Send test payload to new webhook URL
medium line 182

Webhook reference - potential data exfiltration

SourceSKILL.md
182| Root Cause | [e.g., Webhook hit 50K limit without monitoring] |
medium line 193

Webhook reference - potential data exfiltration

SourceSKILL.md
193| Webhook test returns nothing | Webhook URL malformed | Re-copy full URL from Clay table |
low line 55

External URL reference

SourceSKILL.md
55curl -s -o /dev/null -w "clay.com: HTTP %{http_code}\n" https://www.clay.com
low line 78

External URL reference

SourceSKILL.md
78-X POST "https://api.clay.com/v1/people/enrich" \
low line 92

External URL reference

SourceSKILL.md
92CALLBACK_URL="${CLAY_CALLBACK_URL:-https://your-app.com/api/health}"
low line 199

External URL reference

SourceSKILL.md
199- [Clay Community Support](https://community.clay.com)
low line 200

External URL reference

SourceSKILL.md
200- [Clay University](https://university.clay.com)
Scanned on May 12, 2026
View Security Dashboard
Installation guide →