Rebrandly
v1.0.2Rebrandly integration. Manage Links. Use when the user wants to interact with Rebrandly data.
⭐ 0· 97·0 current·0 all-time
byVlad Ursul@gora050
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the runtime instructions: the skill expects to interact with Rebrandly via the Membrane platform/CLI and does not ask for unrelated capabilities or credentials.
Instruction Scope
SKILL.md confines runtime actions to using the Membrane CLI (login, connect, action run, request proxy). It does not instruct reading local files, unrelated environment variables, or exfiltrating data to third parties outside Membrane/Rebrandly. Headless login instructions are explicit and scoped.
Install Mechanism
No install spec in the skill bundle, but SKILL.md recommends installing @membranehq/cli via npm (-g). This is a standard npm global install (moderate risk compared to no install); users should verify the package's provenance and trustworthiness before installing a global CLI.
Credentials
The skill requests no environment variables, no credentials, and delegates authentication to Membrane (explicitly advising not to ask users for API keys). That is proportional to the stated purpose.
Persistence & Privilege
The skill is not always-enabled and does not request elevated or persistent system privileges, nor does it modify other skills or system-wide agent settings.
Assessment
This skill is essentially a set of instructions for using the Membrane CLI as a proxy to Rebrandly. Before installing or using it: (1) Verify you trust the @membranehq/cli npm package and its publisher (npm global installs run code with your user privileges). (2) Understand that Membrane will act as a proxy for API calls — requests and data will flow through Membrane's service, so review their privacy/security docs and your organization's policy. (3) In headless environments, follow the provided login flow carefully (copying URLs and completing browser-based auth) and avoid pasting secrets into shells. Other than those operational considerations, the skill's requirements are proportional and consistent with its stated purpose.Like a lobster shell, security has layers — review code before you run it.
latestvk97dwj24svatbgyb7spgbeq4qx843hkn
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
