Circle 1
v1.0.2Circle integration. Manage data, records, and automate workflows. Use when the user wants to interact with Circle data.
⭐ 0· 74·0 current·0 all-time
byVlad Ursul@gora050
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (Circle integration) align with the instructions: all actions are performed via Membrane, which is a plausible integration layer for Circle. No unrelated services or credentials are requested.
Instruction Scope
SKILL.md stays on-topic: it instructs the agent to install and use the Membrane CLI, create connections, list actions, run actions, and proxy requests to Circle. It does not instruct reading local secrets, unrelated files, or exfiltration to unexpected endpoints.
Install Mechanism
This is an instruction-only skill (no install spec) but recommends globally installing @membranehq/cli via npm. That is coherent with the described workflow but installing global npm binaries has moderate risk (supply-chain/trust considerations)—the instruction itself is not suspicious.
Credentials
The skill declares no required env vars or credentials and relies on browser-based Membrane authentication. It does not request unrelated secrets or many environment variables.
Persistence & Privilege
The skill is not always-enabled and does not request elevated persistence or modification of other skills or system settings. It uses normal CLI-based authentication flows.
Assessment
This skill is coherent: it uses the Membrane CLI to access Circle, and it does not request local secrets. Before installing, consider whether you trust the Membrane provider (@membranehq): review the npm package ownership and recent versions, be aware that npm -g installs run code on your machine, and check the OAuth/permission scopes Membrane requests when you connect your Circle account. If you prefer not to install global packages, you can run the CLI via npx or in a controlled environment instead.Like a lobster shell, security has layers — review code before you run it.
latestvk971t0fcg4fymb1vp1f2cr0c35842ben
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
