Grist

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill matches a Grist integration, but it gives an agent broad Membrane/Grist authority that can modify or delete records, documents, and workspaces without clear scope or confirmation guidance.

Install only if you trust Membrane and are comfortable granting it access to your Grist account. Use a limited-permission Grist account where possible, confirm all destructive or administrative actions before execution, and avoid using the skill on sensitive workspaces unless the access scope is clear.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the agent selects the wrong action or acts on an ambiguous request, it could change or delete Grist records, documents, or workspaces.

Why it was flagged

The primary workflow is generic action execution through Membrane, and the documented action set includes destructive and mutating Grist operations. The artifacts do not add approval, scope, or rollback requirements for these high-impact actions.

Skill content
Use action names and parameters as needed. ... membrane action run <actionId> --connectionId=CONNECTION_ID --input '{"key": "value"}' --json ... Delete Records ... Update Records ... Delete Document ... Delete Workspace
Recommendation

Use only with explicit user approval for create, update, delete, role, user, document, and workspace changes; prefer least-privilege Grist accounts and confirm target IDs before running actions.

What this means

A connected account may retain broad access to Grist data and administrative functions beyond a single task.

Why it was flagged

The skill uses delegated Membrane/Grist authentication with automatic credential refresh for account-management capabilities, but does not specify permission scopes, role limits, or revocation guidance.

Skill content
Manage Workspaces, Users, Roles. ... membrane login --tenant --clientName=<agentType> ... Membrane handles authentication and credentials refresh automatically
Recommendation

Authenticate with the least-privileged account possible, review the granted Membrane/Grist connection, and revoke or rotate access when no longer needed.

What this means

The installed CLI version can change over time and will run locally with the user's privileges.

Why it was flagged

The Membrane CLI is central to the skill's purpose, but the instruction installs a global package using the moving @latest tag rather than a pinned version.

Skill content
npm install -g @membranehq/cli@latest
Recommendation

Verify the package source and consider installing a pinned, reviewed version of the Membrane CLI.

What this means

Grist requests, responses, and connection metadata may pass through Membrane as part of normal operation.

Why it was flagged

The skill intentionally routes Grist integration activity through Membrane, including authentication handling. This is purpose-aligned, but users should understand that a third-party integration layer is involved.

Skill content
This skill uses the Membrane CLI to interact with Grist. Membrane handles authentication and credentials refresh automatically
Recommendation

Review Membrane's trust, privacy, and access model before connecting sensitive Grist workspaces.