Icypeas
v1.0.2Icypeas integration. Manage Organizations, Pipelines, Users, Goals, Filters, Projects. Use when the user wants to interact with Icypeas data.
⭐ 0· 99·0 current·0 all-time
byVlad Ursul@gora050
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description match the instructions: all actions are performed via the Membrane CLI against Icypeas. The skill does not request unrelated environment variables, binaries, or config paths.
Instruction Scope
Instructions stay within the stated purpose (install Membrane CLI, login, create a connection, run actions, or proxy requests to the Icypeas API). Note: the docs expose a proxy mode (membrane request) which allows raw API paths to be forwarded through Membrane for the active connection — this is expected for a proxy-style integration but means the CLI can be used to make arbitrary requests to the connected service's API surface.
Install Mechanism
This is an instruction-only skill (no install spec), but it instructs installing @membranehq/cli via npm -g. Installing a public npm CLI is a common pattern but carries the usual npm-global risks (execution of package install scripts).
Credentials
The skill requires network access and a Membrane account (documented). It does not request unrelated secrets or environment variables and explicitly advises against asking users for API keys.
Persistence & Privilege
Skill flags are default (always: false, model invocation allowed). There is no instruction to modify other skills or system-wide settings; no elevated persistence is requested.
Assessment
This skill appears to do what it says: it uses the Membrane CLI to access Icypeas. Before installing, verify you trust @membranehq/cli (check the npm page and GitHub repo), be aware that npm -g runs code during install, and that logging in via the CLI will grant Membrane access to your Icypeas account (authorization happens in your browser). If you need tighter control, review the connector permissions in Membrane and avoid using the raw proxy command for endpoints outside the intended Icypeas scope.Like a lobster shell, security has layers — review code before you run it.
latestvk975nw8kxjpdga0wp5craenfzs8420bs
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
