Etermin
v1.0.2ETermin integration. Manage Persons, Organizations, Leads, Deals, Activities, Notes and more. Use when the user wants to interact with ETermin data.
⭐ 0· 118·0 current·0 all-time
byVlad Ursul@gora050
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (ETermin integration) align with the instructions: all actions are mediated via the Membrane CLI and target ETermin resources. No unrelated credentials, binaries, or system paths are requested.
Instruction Scope
SKILL.md limits runtime instructions to installing/using the Membrane CLI, creating connections, listing actions, running actions, and optionally proxying API requests via Membrane. It does not instruct reading local files or unrelated environment variables.
Install Mechanism
This is an instruction-only skill (no install spec). It instructs the user to install @membranehq/cli via npm (-g). That is expected for this integration but does require the user to install a third-party global npm package and trust the package/author.
Credentials
The skill declares no environment variables and explicitly instructs not to ask users for API keys (Membrane handles auth). The lack of requested secrets is proportional, but it does mean you must trust Membrane with credential custody and proxied requests.
Persistence & Privilege
always is false and there is no install script or code that modifies agent/system settings. The skill does not request permanent presence or elevated privileges.
Assessment
This skill is instruction-only and coherent: it uses the Membrane CLI to access ETermin and asks you to authenticate via Membrane rather than providing raw API keys. Before installing/using it, confirm you trust Membrane as the intermediary (review their privacy/data retention and the @membranehq/cli npm package author and version). Installing a global npm package is required—ensure you want that on the system. When creating connections, review and limit permissions granted to the connector, and avoid using privileged accounts if not necessary. The static scanner found no code to analyze (no code files), so the security surface is primarily the external Membrane service and the CLI package you install.Like a lobster shell, security has layers — review code before you run it.
latestvk979zv72v44j9255n4ad4z1j4s842z43
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
