Terraform

v1.0.2

Terraform integration. Manage data, records, and automate workflows. Use when the user wants to interact with Terraform data.

0· 64·0 current·0 all-time
byVlad Ursul@gora050
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description match the runtime instructions: the skill uses Membrane to interact with Terraform APIs. There are no unrelated environment variables, binaries, or config paths requested.
Instruction Scope
Instructions are focused on installing the Membrane CLI, logging in, creating connections, running actions, and proxying Terraform API calls via Membrane. The proxy capability lets you send arbitrary API requests (including write/delete operations) — this is expected for an integration but increases the need for care with credentials and permissions.
Install Mechanism
This is an instruction-only skill that recommends installing @membranehq/cli via npm (-g). That is a typical, traceable install path (public npm package) but npm global installs are disk-writing and should be performed only if you trust the package and its publisher.
Credentials
The skill declares no required env vars or local config paths. It relies on Membrane to manage credentials server-side, which is proportionate for this integration.
Persistence & Privilege
always is false and the skill is user-invocable. It does not request persistent elevated privileges or claim to modify other skills or system-wide agent settings.
Assessment
This skill appears internally consistent: it expects you to install and log into the Membrane CLI and to create a Membrane connection to Terraform. Before installing or using it, verify you trust the @membranehq/cli npm package and the Membrane service (review their docs and permissions). Be aware the skill enables proxying arbitrary Terraform API requests through Membrane — avoid running destructive actions unless you understand the connection's permissions. Because this is instruction-only, there is no bundled code to audit; consider limiting the Membrane connection to least-privilege scopes and monitor any write/delete actions. If you are uncomfortable with a global npm install or giving Membrane access to your Terraform environment, do not install the CLI or restrict the connection accordingly.

Like a lobster shell, security has layers — review code before you run it.

latestvk97d8bvtqyen3zvdx225dg6knd8423yj

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments