Confluence
v1.0.0Confluence API integration with managed OAuth. Manage pages, spaces, blogposts, comments, and attachments. Use this skill when users want to create, read, update, or delete Confluence content, manage spaces, or work with comments and attachments. For other third party apps, use the api-gateway skill (https://clawhub.ai/byungkyu/api-gateway). Requires network access and valid Maton API key.
⭐ 0· 589·2 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description say it proxies Confluence via Maton; SKILL.md exclusively calls maton.ai/ctrl.maton.ai/gateway.maton.ai endpoints and requires only MATON_API_KEY. The requested credential aligns with the stated purpose.
Instruction Scope
All runtime instructions are explicit API calls to Maton endpoints and example Python snippets that read only MATON_API_KEY and network resources. The instructions do not reference other env vars, local files, system paths, or unrelated external endpoints.
Install Mechanism
No install spec or code files will be written or executed locally (instruction-only). This minimizes filesystem/installation risk.
Credentials
Only MATON_API_KEY is required, which is proportionate for a gateway-based Confluence integration. Note: this single API key grants access to the Maton proxy which, depending on its scopes, could access Atlassian resources on your behalf—users should limit key scope and create a dedicated key.
Persistence & Privilege
always:false and default invocation settings are normal. The skill does not request persistent system-wide privileges or config paths.
Assessment
This skill is coherent: it calls Maton-hosted proxy endpoints and only needs MATON_API_KEY. Before installing, verify the Maton service (maton.ai) is trustworthy for your organization, and create a dedicated API key with the least privilege needed. Review the OAuth connection flow and requested Confluence scopes in the Maton dashboard, monitor and revoke keys/connections if unexpected activity appears, and avoid putting high-privilege credentials in long-lived keys unless you control or fully trust the gateway operator. Note the registry metadata lists no homepage/source—confirm the publisher identity if this will be used in a sensitive environment.Like a lobster shell, security has layers — review code before you run it.
latestvk9796w0n1kwrk73q1jwb7gn1b1812d7v
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🧠 Clawdis
EnvMATON_API_KEY
