Graphlinq
v1.0.2GraphLinq Protocol integration. Manage data, records, and automate workflows. Use when the user wants to interact with GraphLinq Protocol data.
⭐ 0· 108·0 current·0 all-time
byVlad Ursul@gora050
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Skill claims to integrate with GraphLinq and its runtime instructions exclusively describe using the Membrane CLI and Membrane connections to reach GraphLinq; requested capabilities match the stated purpose.
Instruction Scope
SKILL.md tells the agent to install and run the Membrane CLI, perform connector discovery, create connections, list and run actions, and proxy requests through Membrane. It does not instruct reading unrelated files, environmental secrets, or exfiltrating data to unexpected endpoints.
Install Mechanism
This is an instruction-only skill (no install spec). It recommends installing @membranehq/cli via npm -g or using npx. Installing a third-party CLI globally is a standard approach but requires trusting the package and its publisher.
Credentials
The skill declares no required environment variables or credentials and instructs using Membrane's browser-based connection flow (server-side auth). No unrelated or excessive secrets are requested.
Persistence & Privilege
always:false and no install-time modifications are present. The skill is instruction-only and does not request persistent elevated presence or modify other skills/configs.
Assessment
This skill appears coherent and limited to using the Membrane CLI as a proxy to GraphLinq. Before installing or running commands: (1) confirm you trust the @membranehq/cli npm package and its publisher; global npm installs run code on your machine. (2) When you run membrane login/connect, you will grant Membrane access to your GraphLinq account — review the permissions and privacy policy on getmembrane.com. (3) The skill requires network access and a Membrane account; it does not need local secrets or other service credentials. (4) If you will let an autonomous agent invoke this skill, consider whether you want the agent to be able to run CLI commands on your environment and open browser auth flows; if not, disable autonomous invocation or restrict the agent's shell access.Like a lobster shell, security has layers — review code before you run it.
latestvk971znca8r7vbff5bcmpyeg5jd842t6j
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
