Snowplow Analytics

ReviewAudited by ClawScan on May 10, 2026.

Overview

This looks like a legitimate Membrane-based Snowplow integration, but it gives the agent broad authenticated API/proxy access, including write/delete methods, without clear scoping or confirmation guidance.

Install only if you trust Membrane as an intermediary for your Snowplow account. Use a least-privileged connection, verify the CLI package before installing it globally, and require explicit approval before the agent runs any write or delete API request.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If invoked too broadly, the agent could make authenticated changes to Snowplow resources, pipelines, users, roles, or other account data through the proxy.

Why it was flagged

The skill documents a raw authenticated API escape hatch with write/delete-capable methods, but does not define approval steps, endpoint limits, or rollback guidance for high-impact Snowplow account changes.

Skill content
“Proxy requests… send requests directly to the Snowplow Analytics API through Membrane's proxy… injects the correct authentication headers” and “HTTP method (GET, POST, PUT, PATCH, DELETE).”
Recommendation

Only allow proxy requests for specific user-approved endpoints and require explicit confirmation before any POST, PUT, PATCH, or DELETE request.

What this means

The agent may act with the privileges of the Membrane/Snowplow connection the user authorizes.

Why it was flagged

The integration requires delegated authentication through Membrane. This is expected for a Snowplow integration, but it gives the agent access through the connected account.

Skill content
“membrane login --tenant --clientName=<agentType>” and “Membrane handles authentication and credentials refresh automatically.”
Recommendation

Use the least-privileged Snowplow account or connection available and review the permissions granted during authentication.

What this means

The behavior depends on the npm package that is installed at setup time, not just the reviewed SKILL.md text.

Why it was flagged

The skill asks users to install a global npm CLI at the latest version. This is central to the stated Membrane workflow, but it is unpinned and outside the instruction-only artifact itself.

Skill content
“npm install -g @membranehq/cli@latest”
Recommendation

Install the CLI from the official package source, consider pinning a known-good version, and avoid running the global install in highly sensitive environments without review.

What this means

Requests and response data may pass through Membrane while interacting with Snowplow.

Why it was flagged

Snowplow API traffic and authentication are mediated by the Membrane service. This is disclosed and purpose-aligned, but users should understand that an external gateway is in the data path.

Skill content
“send requests directly to the Snowplow Analytics API through Membrane's proxy… Membrane automatically appends the base URL… and injects the correct authentication headers.”
Recommendation

Confirm that Membrane is an approved intermediary for the Snowplow data involved, especially for production or sensitive analytics data.