Bright Security

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill is a coherent Bright Security/Membrane integration, but it gives the agent broad authenticated API control, including write/delete proxy requests, without clear approval or scoping guardrails.

Install only if you trust Membrane and intend to let the agent operate on Bright Security through your account. Require explicit confirmation before any create, update, delete, scan, organization, or user-management action, and prefer scoped listed actions instead of raw proxy requests.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent using this skill could make broad changes to Bright Security data or configuration if prompted incorrectly or if it misunderstands the user's intent.

Why it was flagged

This documents a raw authenticated API escape hatch, including destructive methods, without visible confirmation or scoping requirements for high-impact Bright Security account operations.

Skill content
When the available actions don't cover your use case, you can send requests directly to the Bright Security API through Membrane's proxy... HTTP method (GET, POST, PUT, PATCH, DELETE).
Recommendation

Use only with explicit user-directed tasks, require confirmation before POST/PUT/PATCH/DELETE or scan/project/user changes, and prefer scoped Membrane actions over raw proxy requests.

What this means

The skill can access Bright Security through the user's Membrane-connected identity.

Why it was flagged

The skill relies on delegated authentication and refreshed credentials. This is expected for the integration, but it means actions run with the user's connected account privileges.

Skill content
Membrane handles authentication and credentials refresh automatically... membrane login --tenant --clientName=<agentType>
Recommendation

Connect the least-privileged Bright Security account needed and review what tenant/account is being authenticated.

What this means

The installed CLI code may differ over time as the latest npm package changes.

Why it was flagged

The setup uses a global npm install of the latest CLI version. This is consistent with the skill's Membrane-based purpose, but the exact package version is not pinned in the artifact.

Skill content
npm install -g @membranehq/cli@latest
Recommendation

Install from the official package source and consider pinning a known-good CLI version in controlled environments.

What this means

Bright Security data requested by the agent may be routed through Membrane as part of the integration.

Why it was flagged

Bright Security API requests are mediated by Membrane's proxy. This is disclosed and purpose-aligned, but users should recognize that API requests and responses pass through a third-party integration layer.

Skill content
send requests directly to the Bright Security API through Membrane's proxy... injects the correct authentication headers
Recommendation

Review Membrane's data-handling terms and avoid sending unnecessary sensitive data through proxy requests.