Fivetran
v1.0.2Fivetran integration. Manage Connectors, Groups. Use when the user wants to interact with Fivetran data.
⭐ 0· 149·0 current·0 all-time
byVlad Ursul@gora050
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name/description (Fivetran integration) match the instructions: all actions are performed via the Membrane CLI and proxy. Required capabilities (network access, Membrane account, installing @membranehq/cli) are proportional to the stated purpose.
Instruction Scope
SKILL.md confines runtime instructions to installing/using the Membrane CLI and running specific commands/actions. It also documents a 'proxy' mode that allows arbitrary Fivetran API paths — this is functional for advanced use but gives broad discretion to craft arbitrary API calls through Membrane.
Install Mechanism
This is an instruction-only skill (no install spec). It asks users to npm install -g @membranehq/cli — a reasonable but moderately privileged global install step. Nothing in the skill downloads arbitrary code or writes files itself.
Credentials
The skill declares no required env vars or local credentials and relies on Membrane to handle auth. That is consistent, but it means authentication and API traffic (including potentially sensitive data) flow through Membrane's servers.
Persistence & Privilege
The skill does not request always:true or other elevated platform privileges; it's user-invocable and allows autonomous invocation by default (platform normal). It does not modify other skills or system-wide settings.
Assessment
This skill is coherent but depends on the third-party Membrane service to authenticate and proxy all Fivetran API calls. Before installing: (1) Decide whether you trust Membrane to see your Fivetran metadata/data; review their privacy/security docs and the referenced GitHub repo; (2) Consider using a dedicated, least-privilege Membrane/Fivetran account for automation; (3) Note the skill allows arbitrary proxy API calls — avoid granting it access in environments with highly sensitive data unless you trust the service and the agent's usage policy; (4) Installing the CLI requires npm -g which modifies the system‑wide environment.Like a lobster shell, security has layers — review code before you run it.
latestvk977pyjfkvdxdx7bryfgfh87b9842zgg
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
