Cursor
v1.0.2Cursor integration. Manage data, records, and automate workflows. Use when the user wants to interact with Cursor data.
⭐ 0· 85·0 current·0 all-time
byVlad Ursul@gora050
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (Cursor integration) match the instructions: all actions are performed via the Membrane CLI and target Cursor. There are no unrelated environment variables, binaries, or config paths requested.
Instruction Scope
SKILL.md instructs the agent to install and use the Membrane CLI, run connector/action/request commands, and perform browser-based authentication. It does not instruct reading unrelated files, environment variables, or exfiltrating data outside the Membrane/Cursor flow.
Install Mechanism
The skill is instruction-only (no packaged install), but recommends installing @membranehq/cli globally via npm. Installing a global npm CLI is a reasonable expectation for this integration, but it does execute third-party code from the npm registry — verify the package identity and trust the publisher before installing.
Credentials
No environment variables, credentials, or config paths are required by the skill. Authentication is delegated to Membrane via browser-based login/connection creation, which is proportional to the goal of connecting to Cursor.
Persistence & Privilege
The skill does not request always:true nor attempt to modify other skills or system-wide settings. It is user-invocable and allows autonomous invocation (platform default), which is expected for a connector skill.
Assessment
This skill is coherent but depends on the Membrane CLI and a Membrane account. Before using: (1) Confirm you trust the @membranehq/cli npm package and publisher (global npm installs run code on your machine). (2) Understand that Membrane will broker access to Cursor — Membrane's service will see requests and manage credentials, so review their privacy/terms if you have sensitive data. (3) In headless or automated environments, you'll follow a browser-based auth flow or copy codes; ensure you are comfortable completing that flow. If you prefer not to install third-party CLIs, do not install this skill; it is instruction-only and relies on that CLI to function.Like a lobster shell, security has layers — review code before you run it.
latestvk971mms31kprsavkqvkp4fa68s842z37
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
