Hankoio
v1.0.2Hanko.io integration. Manage data, records, and automate workflows. Use when the user wants to interact with Hanko.io data.
⭐ 0· 122·0 current·0 all-time
byVlad Ursul@gora050
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (Hanko.io integration) matches the instructions: all actions are performed via the Membrane CLI which proxies requests to Hanko.io. No unrelated credentials, binaries, or config paths are requested.
Instruction Scope
SKILL.md confines the agent to using membrane CLI commands (login, connect, action list/run, request proxy). It does not instruct reading unrelated files or exfiltrating data, and explicitly advises against asking users for raw API keys.
Install Mechanism
The skill is instruction-only (no install spec), but it tells users to run 'npm install -g @membranehq/cli' and uses 'npx ...@latest' in examples. Installing global npm packages or fetching latest via npx is a moderate supply-chain risk and should be done from a trusted source or pinned version.
Credentials
No environment variables, credentials, or config paths are required by the skill itself. The workflow depends on a Membrane account and browser-based authentication which is proportional to the described proxy approach.
Persistence & Privilege
The skill does not request always: true or other elevated persistence. It is user-invocable and allows autonomous invocation (platform default), which is expected for skills of this type.
Assessment
This skill appears coherent: it delegates Hanko.io access to Membrane and doesn't request local secrets. Before installing, verify you trust Membrane/getmembrane.com and the @membranehq/cli package (review the package repo, prefer installing a pinned version rather than untrusted 'latest', and avoid unnecessary global npm installs). Understand that Membrane's servers will hold the connection credentials and proxy Hanko.io requests — only proceed if you are comfortable with that data flow.Like a lobster shell, security has layers — review code before you run it.
latestvk973abfqn50tn702fahxamtbp9842hmn
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
