Redis Labs
Analysis
This looks like a legitimate Redis Labs/Membrane integration, but it gives broad authenticated API access that can change or delete Redis Labs data.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
When the available actions don't cover your use case, you can send requests directly to the Redis Labs API through Membrane's proxy... `-X, --method` | HTTP method (GET, POST, PUT, PATCH, DELETE).
The skill exposes a raw authenticated API escape hatch with mutating and destructive methods, not just scoped prebuilt Redis Labs actions.
`npm install -g @membranehq/cli` ... `npx @membranehq/cli@latest action list ...`
The setup uses a globally installed npm CLI and an unpinned @latest invocation; this is purpose-aligned but relies on npm package provenance and the current published version.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Membrane handles authentication and credentials refresh automatically... The user completes authentication in the browser.
The integration depends on delegated authentication and persistent credential refresh through Membrane, which is expected but grants meaningful account authority.
