Search Api

ReviewAudited by ClawScan on May 10, 2026.

Overview

This skill is not clearly malicious, but its purpose is inconsistent and it gives broad authenticated API/proxy commands that could go beyond simple search.

Review this skill carefully before installing. Confirm that it is really the Search API connector you intend to use, connect only the account you want the agent to access, avoid raw proxy/full-URL requests unless you understand them, and require confirmation before any command that can modify or delete data.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user or agent may connect the wrong service or trust the skill to perform account-management actions that do not match the documented Search API purpose.

Why it was flagged

The claimed business-object management capability does not fit the linked Google Custom Search API documentation, making the skill's actual purpose and expected authority unclear.

Skill content
description: | Search API integration. Manage Deals, Persons, Organizations, Leads, Projects, Pipelines and more... Official docs: https://developers.google.com/custom-search/v1/reference/rest
Recommendation

Verify the intended provider and connector before use, and do not grant account access until the skill description and API documentation are consistent.

What this means

If followed too broadly, the agent could make authenticated requests that modify or delete data, or operate outside the intended search workflow.

Why it was flagged

The skill documents a broad raw API escape hatch, including mutating methods and full-URL requests, without clear limits or user-approval requirements.

Skill content
npx @membranehq/cli@latest request CONNECTION_ID /path/to/endpoint ... HTTP method (GET, POST, PUT, PATCH, DELETE) ... You can also pass a full URL instead of a relative path — Membrane will use it as-is.
Recommendation

Prefer the listed Membrane actions, require explicit user confirmation before any POST/PUT/PATCH/DELETE request, and avoid full-URL proxy calls unless the destination and effect are reviewed.

What this means

Anyone or any process able to use that local Membrane credential file may be able to act through the user's Membrane account.

Why it was flagged

The skill uses persistent local Membrane credentials. This is disclosed and expected for the integration, but it creates reusable delegated account access.

Skill content
After login, credentials are stored in `~/.membrane/credentials.json` and reused for all future commands.
Recommendation

Use the skill only on trusted machines, protect the credential file, and revoke or remove Membrane credentials when no longer needed.

What this means

Future CLI changes or a supply-chain issue could affect what runs locally when the command is executed.

Why it was flagged

The skill relies on an unpinned latest-version CLI fetched through npx. This is central to the stated Membrane workflow, but it means the executed code can change over time.

Skill content
This skill uses the Membrane CLI (`npx @membranehq/cli@latest`) ... npx @membranehq/cli@latest login --tenant
Recommendation

Consider pinning a known-good CLI version and verifying the package source before running it in sensitive environments.