Pidj

v1.0.2

Pidj integration. Manage Persons, Organizations, Deals, Leads, Projects, Activities and more. Use when the user wants to interact with Pidj data.

0· 124·0 current·0 all-time
byVlad Ursul@gora050
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (Pidj integration) matches the instructions: all actions use the Membrane CLI to connect to Pidj. No unrelated credentials, binaries, or config paths are requested.
Instruction Scope
Instructions only tell the agent to install/run the Membrane CLI, authenticate (browser flow or headless code), list actions, run actions, and proxy requests to Pidj via Membrane. They do not instruct reading unrelated files or env vars. Note: proxied requests and action inputs will be sent to Membrane's servers (expected for this integration).
Install Mechanism
This is an instruction-only skill (no install spec). It asks users to install the Membrane CLI via npm -g or use npx. That is normal, but global npm installs modify the local environment—using npx avoids a global install.
Credentials
The skill declares no required environment variables or credentials and explicitly advises letting Membrane manage authentication server-side. The lack of requested secrets is proportionate.
Persistence & Privilege
always is false and the skill has no install-time hooks or config writes. Model invocation is allowed (platform default), which is normal and not by itself concerning.
Assessment
This skill appears to do what it says: it uses Membrane's CLI to access Pidj and asks you to authenticate via the official flow. Before installing or using it: (1) confirm you trust Membrane (requests are proxied through their service), (2) prefer using npx to avoid a global npm install, (3) avoid pasting sensitive secrets into action inputs unless you understand where they will be sent, and (4) review Membrane's privacy/security documentation if you will transmit confidential data.

Like a lobster shell, security has layers — review code before you run it.

latestvk97a02hcdwke2zyejd708d79hd8437t6

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments