Stammerai
Analysis
Stammerai appears purpose-related, but it asks the agent to run an unpinned remote CLI, create persistent account credentials, and make broad authenticated proxy requests that are not clearly bounded.
Findings (8)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
`npx @membranehq/cli@latest request CONNECTION_ID /path/to/endpoint` ... `HTTP method (GET, POST, PUT, PATCH, DELETE)` ... `You can also pass a full URL instead of a relative path — Membrane will use it as-is.`
The skill exposes a broad authenticated request tool, including destructive methods, custom request data, and arbitrary full URLs, without documented confirmation or containment rules.
`This skill uses the Membrane CLI (npx @membranehq/cli@latest) to interact with Stammer.ai.`
The runtime dependency is fetched with `@latest`, so the executable code can change over time and is not pinned or captured by an install spec.
`npx @membranehq/cli@latest login --tenant`
The skill is instruction-only but tells the agent to execute an external CLI via `npx`; this is purpose-aligned for Membrane integration but still runs code in the user's environment.
`HTTP method (GET, POST, PUT, PATCH, DELETE). Defaults to GET`
The skill allows state-changing and destructive API methods against an external account without stated rollback, dry-run, or approval requirements.
`credentials are stored in ~/.membrane/credentials.json` ... `Membrane manages the full Auth lifecycle server-side with no local secrets.`
The claim of `no local secrets` is potentially misleading because the same instructions say local credentials are stored and reused.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
`npx @membranehq/cli@latest login --tenant` ... `credentials are stored in ~/.membrane/credentials.json and reused for all future commands.`
The skill requires tenant-level Membrane authentication and persistent local credentials, while the supplied requirements declare no primary credential or required config path.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
`credentials are stored in ~/.membrane/credentials.json and reused for all future commands.`
The skill creates persistent local authentication state that can be reused across future tasks, but the registry does not declare a required config path or credential.
`Membrane ... injects the correct authentication headers` ... `You can also pass a full URL instead of a relative path — Membrane will use it as-is.`
The skill routes requests through a third-party proxy/gateway and allows full URLs, making the destination and authentication-header boundary unclear from the artifact.
