专为百度秒哒应用打造的SecondMe OAuth2登录和API集成工具,完成Connect to SecondMe OAuth2接入
v1.0.2SecondMe Connect - 数字分身集成器。让百度秒哒应用轻松接入SecondMe生态,一键实现OAuth2登录和完整API调用。3步完成集成,开箱即用。
⭐ 0· 25·0 current·0 all-time
bySocialite UCL LJH@lijinhongucl-pixel
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (SecondMe OAuth2 + API integration for 百度秒哒 apps) match the included templates and runtime instructions: front-end React components, a Supabase-backed profiles table, and an Edge Function that exchanges code for tokens and creates/updates Supabase users. The required binaries (node, npm) and the requested env vars (Supabase URLs/keys, SecondMe client id/secret, redirect URIs, ALLOWED_ORIGINS) are appropriate and expected for this purpose.
Instruction Scope
SKILL.md and the Edge Function code stay within the stated purpose: they perform OAuth code->token exchange, persist tokens to the profiles table, and generate a magic link for sign-in. One notable design choice: user access_tokens are stored in profiles.secondme_access_token and the front-end is allowed to read the user's own token (protected by RLS). This is an explicit tradeoff (direct client calls to SecondMe) and increases risk if RLS is misconfigured — the docs repeatedly warn about this and instruct testing, but the deployment must carefully validate RLS and CORS.
Install Mechanism
There is no remote install/download step; this is an instruction-only/template package containing source files for developers to copy into their project. No external arbitrary archives or network-based installers are pulled by the skill itself.
Credentials
The skill requests multiple secrets (SUPABASE_SERVICE_ROLE_KEY, SECONDME_CLIENT_SECRET) which are high-privilege but necessary for the Edge Function to create/update Supabase users and perform server-side token exchanges. The number of env vars is justified by the architecture, but operational caution is required: the service role key must be kept secret and only put into server/Edge Function environment (not in repos or frontend). Also note the manifest bit in the registry showed 'Required env vars: [object Object]' (formatting bug) — rely on SKILL.md for the accurate list.
Persistence & Privilege
The skill does not request always:true and does not modify other skills or global agent settings. It needs no persistent elevated platform privileges beyond the expected use of a Supabase service key inside an Edge Function (which is declared and documented).
Assessment
This package is coherent for its stated goal, but follow these safety checks before deploying:
- Treat SUPABASE_SERVICE_ROLE_KEY and SECONDME_CLIENT_SECRET as highly sensitive: configure them only in server/Edge Function secrets (e.g., supabase secrets), never commit to source or expose to the frontend.
- Rigorously test Row-Level Security (RLS) in your Supabase project: authenticate as different users and confirm SELECT/UPDATE only returns each user's own profile row. If RLS is misconfigured, stored access_tokens could be exposed.
- Consider whether the frontend truly needs direct access to the raw SecondMe access_token. If possible, proxy API calls through the Edge Function (server-side) to avoid giving tokens to client code.
- Configure ALLOWED_ORIGINS strictly (do not use '*'). Verify the getAllowedOrigins/CORS implementation behaves as you expect in your deployment environment.
- Review Edge Function logs and the token-exchange endpoint usage (https://api.mindverse.com...) to ensure tokens are obtained and stored exactly as intended; confirm that the skill is calling the official SecondMe endpoints for your integration.
- The registry metadata had a formatting bug for the env listing — rely on SKILL.md and the template files to understand required env vars.
- Perform a light code review of the Edge Function's use of supabase.admin APIs (listUsers/createUser/generateLink) and ensure it matches your Supabase plan/ACLs and that magic-link behavior meets your security requirements (token lifetime, revocation).
If you are not comfortable managing high-privilege keys or verifying RLS/CORS yourself, involve a developer or security engineer before deploying to production.Like a lobster shell, security has layers — review code before you run it.
latestvk9727ba2jwm67j0t6vjr0e1q6d84dmex
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🔐 Clawdis
Binsnode, npm
Env[object Object], [object Object], [object Object], [object Object], [object Object], [object Object], [object Object], [object Object], [object Object], [object Object]
