Self-Integration

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

This skill is transparent about using Membrane to control external apps, but it gives the agent very broad authority to create and run actions across connected services.

Install only if you trust Membrane and need a broad cross-app automation skill. Use a limited token, connect only necessary apps, review generated connectors/actions, and require confirmation before the agent sends messages, changes records, syncs data, or performs any bulk or irreversible operation.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the agent misunderstands the user or is given unsafe instructions, it could send messages, create or modify tasks, sync data, or change records in connected third-party apps.

Why it was flagged

The skill exposes a generic mechanism to execute arbitrary actions against external services, including mutating operations, without visible guardrails such as explicit confirmation for destructive, public, or bulk actions.

Skill content
Connect to any external app and perform actions on it... perform any API operation... `POST /actions/{actionId}/run?connectionId=con_abc123`
Recommendation

Require explicit user confirmation before any mutating, public, bulk, financial, or irreversible action, and show the target app, connection, action name, and input parameters before running it.

What this means

Anyone or any agent flow with access to the token may be able to use existing Membrane connections to act in Slack, HubSpot, Salesforce, GitHub, Google Sheets, or other linked services.

Why it was flagged

The Membrane token is used to list and operate on authenticated external-app connections. This is expected for the integration, but it can represent broad delegated authority across many accounts.

Skill content
Authorization: Bearer $MEMBRANE_TOKEN... A connection is an authenticated link to an external app... `GET /connections`
Recommendation

Use the least-privileged Membrane token available, connect only the apps needed for the task, monitor activity, and revoke or rotate the token and app connections when no longer needed.

What this means

Generated connectors or actions could have broader behavior than the user expected, especially when they are used to modify third-party accounts.

Why it was flagged

The skill can ask a remote Membrane agent to dynamically build new connectors or actions. The artifacts do not describe review, provenance, testing, or safety boundaries for generated integrations.

Skill content
If nothing is found, go to step 1c to build a connector... `POST /agent/sessions` with body `{"prompt": "Build a connector for Slack..."}`
Recommendation

Review newly generated connectors/actions before use, prefer existing trusted connectors, and avoid running generated mutating actions until the requested permissions and inputs are clear.

What this means

Task details and connection identifiers may be sent to Membrane's agent service while building connectors or actions.

Why it was flagged

The OpenClaw agent is instructed to communicate with a separate Membrane agent and include connection identifiers in prompts. This is disclosed and purpose-aligned, but the artifact does not specify the remote agent's data-handling boundaries.

Skill content
Use Membrane Agent. ALWAYS include the connection ID in the prompt: `POST /agent/sessions`...
Recommendation

Avoid putting unnecessary secrets or sensitive business data in connector/action-building prompts, and confirm Membrane's data-retention and access policies before using it with sensitive accounts.