Algomo
v1.0.2Algomo integration. Manage data, records, and automate workflows. Use when the user wants to interact with Algomo data.
⭐ 0· 125·0 current·0 all-time
byMembrane Dev@membranedev
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (Algomo integration) matches the instructions: all actions are performed via the Membrane CLI and Membrane proxy to Algomo, which is a coherent implementation choice.
Instruction Scope
SKILL.md only instructs installing and using the Membrane CLI, running its commands, and authenticating via browser; it does not request reading unrelated files, environment variables, or exfiltrating data to unexpected endpoints.
Install Mechanism
There is no platform install spec, but the instructions tell the user to run `npm install -g @membranehq/cli`. Installing a global npm package is common but involves running third-party code outside the skill sandbox—verify the package source before installing.
Credentials
The skill declares no required env vars or secrets and explicitly instructs you to let Membrane manage credentials rather than asking for API keys locally; requested access is proportionate to the described integration.
Persistence & Privilege
The skill is not forced-always (always: false) and contains no instructions to modify other skills or system-wide agent settings; autonomous invocation is allowed by default but not elevated here.
Assessment
This skill appears coherent: it uses the Membrane CLI to manage connections to Algomo and does not request unrelated credentials. Before installing, verify the @membranehq/cli package and the getmembrane.com / GitHub repository are the legitimate upstream sources you expect (check npm/GitHub package pages and maintainers). Be aware the CLI performs browser-based authentication and that Membrane will handle/hold the connection credentials server-side — if your organization restricts third-party credential storage, confirm that policy first. Finally, avoid running commands copied from unknown sources and review OAuth scopes/prompts when you authenticate.Like a lobster shell, security has layers — review code before you run it.
latestvk978ewwts33trqm6ftz89r95358422sw
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
