Zonka Feedback
v1.0.2Zonka Feedback integration. Manage data, records, and automate workflows. Use when the user wants to interact with Zonka Feedback data.
⭐ 0· 78·0 current·0 all-time
byVlad Ursul@gora050
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The SKILL.md describes integrating with Zonka Feedback and all instructions use the Membrane CLI to discover connectors, run actions, and proxy API requests — this is coherent with the stated purpose.
Instruction Scope
Instructions are limited to installing/using the Membrane CLI, creating connections, listing actions, running actions, and proxying API requests. They do not instruct reading unrelated files or requesting unrelated credentials.
Install Mechanism
The skill is instruction-only and asks the user to install the Membrane CLI via npm (global install). This is a reasonable, expected mechanism for a CLI-based integration; consider using npx or a local install if you prefer to avoid global npm installs.
Credentials
No environment variables or unrelated credentials are requested. The SKILL.md explicitly advises against asking the user for API keys and relies on Membrane to manage auth, which matches the integration model.
Persistence & Privilege
The skill does not request always: true or other elevated persistent privileges. It relies on the external Membrane service and a local CLI session for authentication; autonomous invocation remains the platform default but is not excessive here.
Assessment
This skill is coherent: it uses the Membrane CLI to connect to Zonka Feedback and explicitly relies on Membrane to manage credentials. Before installing, confirm you trust the Membrane service (https://getmembrane.com) because it will handle auth and proxy requests on your behalf. If you prefer not to install a global npm package, use npx or a local install. If your organization has data residency or security policies, verify that routing Zonka API calls through Membrane complies with those policies.Like a lobster shell, security has layers — review code before you run it.
latestvk979zhpckxn4f5rd2qanrncdzx843hc5
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
