Supercast
v1.0.2Supercast integration. Manage Persons, Organizations, Deals, Leads, Projects, Pipelines and more. Use when the user wants to interact with Supercast data.
⭐ 0· 90·0 current·0 all-time
byVlad Ursul@gora050
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (Supercast integration) matches the runtime instructions: all operations are mediated via the Membrane CLI and Membrane connections to Supercast. No unrelated services, credentials, or binaries are requested.
Instruction Scope
SKILL.md stays on topic: it instructs installing and using the Membrane CLI, creating connections, listing actions, running actions, and proxying requests to Supercast. It does not instruct reading unrelated files or exporting secrets, and explicitly advises not to request user API keys.
Install Mechanism
There is no install spec embedded in the skill. The doc recommends installing @membranehq/cli via npm (a standard public package), which is reasonable and traceable; the skill itself does not download or write code.
Credentials
The skill declares no required env vars or credentials. It requires a Membrane account (handled via browser-based login) which aligns with the described flow. There are no disproportionate credential requests.
Persistence & Privilege
The skill is not always-on, is user-invocable, and does not request elevated or persistent system privileges. It does not modify other skills or system-wide settings.
Assessment
This is an instruction-only skill that uses the Membrane CLI to access Supercast; before installing or running commands, verify you trust Membrane/@membranehq/cli on npm and be aware that npm -g will install a global binary on your system. The skill uses browser-based authentication (or headless flow) so you won't be asked for raw Supercast API keys. Ensure network access is allowed and review the Membrane CLI package page and privacy/security docs if you need stronger assurances before proceeding.Like a lobster shell, security has layers — review code before you run it.
latestvk97bfz392e15k8kd898a2j126s842sbr
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
