Geckoboard
v1.0.2Geckoboard integration. Manage Dashboards, Datasets. Use when the user wants to interact with Geckoboard data.
⭐ 0· 101·0 current·0 all-time
byVlad Ursul@gora050
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill describes Geckoboard dashboard/dataset management and all runtime instructions use the Membrane CLI to connect to Geckoboard. No unrelated credentials, binaries, or system paths are requested.
Instruction Scope
The SKILL.md confines actions to Membrane CLI commands (login, connect, action run, request proxy). That is consistent with the purpose. Note that the instructions allow arbitrary proxied API requests via `membrane request`, which can perform any Geckoboard API call once a connection is authorized — this is expected but means you should trust Membrane and the connection before running arbitrary requests.
Install Mechanism
No platform-level install spec is present (instruction-only). The doc recommends installing the CLI via `npm install -g @membranehq/cli` (public npm registry). This is reasonable for the described workflow but installing a global npm package alters the system environment; verify the package and publisher before installing.
Credentials
The skill requires no environment variables or local secrets. Authentication is handled via Membrane account/browser OAuth as documented, which is proportionate to the task.
Persistence & Privilege
The skill is not always-enabled and is user-invocable. It does not request persistent system-wide privileges or modify other skills' configurations.
Assessment
This skill is internally consistent: it instructs you to install and use the Membrane CLI to manage Geckoboard via a browser-based login, and it does not request local secrets or unrelated system access. Before installing or using it, verify you trust the Membrane project and the npm package (@membranehq/cli), avoid running global installs as an unsafe user (use a managed environment or nvm), and review any proxied API requests or actions before running them since they can access or modify your Geckoboard data once a connection is authorized.Like a lobster shell, security has layers — review code before you run it.
latestvk970kh63vdrkb4rk0zvb7yzzwh843fk7
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
