Zuplo

v1.0.0

Zuplo integration. Manage data, records, and automate workflows. Use when the user wants to interact with Zuplo data.

0· 70·0 current·0 all-time
byVlad Ursul@gora050
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (Zuplo integration) matches the instructions: the skill relies on Membrane's CLI to create a Zuplo connection, run actions, and proxy requests. Required capabilities (network, Membrane account, Membrane CLI) are coherent with the stated purpose.
Instruction Scope
SKILL.md only instructs installing and using the Membrane CLI, performing browser-based login, creating connections, listing/running actions, and proxying requests. It does not ask the agent to read unrelated files, access unrelated env vars, or exfiltrate data to unexpected endpoints.
Install Mechanism
No automatic install spec in the registry (instruction-only). The doc recommends `npm install -g @membranehq/cli` (a normal, traceable npm step) — this is standard but has the usual cautions about global npm installs and third-party package provenance.
Credentials
The skill requests no environment variables or keys. It explicitly recommends creating a connection so Membrane handles auth server-side, which aligns with the described workflow.
Persistence & Privilege
The skill does not request always:true, does not modify other skills or system-wide settings, and does not require persistent background privileges beyond installing and using the CLI under the user's account.
Assessment
This skill is coherent, but before installing: (1) verify the @membranehq/cli package on npm (author, downloads, repository) to confirm provenance; (2) prefer using `npx` or a local install rather than a global `-g` install if you want less impact on your system; (3) be aware that using Membrane means requests and authentication are handled via Membrane's service — confidential data and API calls will transit through and may be stored by Membrane, so confirm you trust that service and its privacy/security practices; (4) run initial experiments in an isolated environment (container or VM) if you want to limit risk.

Like a lobster shell, security has layers — review code before you run it.

latestvk97e5wsvsbc24dhe6f03aem8ds8442nf

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments