Totango
v1.0.2Totango integration. Manage data, records, and automate workflows. Use when the user wants to interact with Totango data.
⭐ 0· 106·0 current·0 all-time
byVlad Ursul@gora050
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill declares a Totango integration and all instructions show use of the Membrane CLI and a Membrane account to connect to Totango. No unrelated services, binaries, or credentials are requested.
Instruction Scope
SKILL.md stays on-topic: it instructs installing/running the Membrane CLI, creating connections, listing actions, running actions, and proxying requests to Totango. It does not instruct reading arbitrary local files, other credentials, or exfiltrating data to unexpected endpoints.
Install Mechanism
There is no automated install spec in the skill bundle. The README recommends installing @membranehq/cli via npm (a normal developer workflow) and using npx for one-off commands. No remote downloads or archive extraction are referenced.
Credentials
The skill declares no required environment variables or credentials and explicitly delegates auth to Membrane. This is proportionate for a connector-based integration; it avoids asking the user for Totango API keys.
Persistence & Privilege
The skill is not always-on, does not request elevated platform privileges, and is instruction-only (no code written to agent config). Autonomous invocation remains possible but is the platform default and not combined with other risks here.
Assessment
This skill appears coherent: it uses the Membrane CLI to manage Totango connections and does not request unrelated secrets. Before installing, confirm you trust Membrane/@membranehq and that you want to grant Membrane access to your Totango account (auth happens via browser consent). Installing the recommended npm CLI will add a global tool to your environment—ensure you install packages from sources you trust. As always, avoid pasting sensitive keys into prompts; follow the described browser-based connection flow so credentials are managed by Membrane rather than entered manually.Like a lobster shell, security has layers — review code before you run it.
latestvk972zwg5x2je35c3a1gcnb5bq5843bq6
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
