Filestack

v1.0.0

FileStack integration. Manage data, records, and automate workflows. Use when the user wants to interact with FileStack data.

0· 25·0 current·0 all-time
byMembrane Dev@membranedev
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The skill claims FileStack integration and all instructions use the Membrane CLI to connect, list actions, run actions, and proxy requests to FileStack. It does not request unrelated credentials or system access.
Instruction Scope
SKILL.md limits runtime steps to installing/using the Membrane CLI, logging in, creating/listing connections, running actions, and proxying requests to FileStack. It does not instruct reading unrelated files or exfiltrating data to unknown endpoints.
Install Mechanism
The registry contains no install spec (low risk), but the skill instructs users to install the Membrane CLI via 'npm install -g @membranehq/cli' and to use 'npx' in examples. Installing global npm packages and using npx executes code from the npm registry—expected here but worth noting as a general supply-chain consideration.
Credentials
No environment variables, credentials, or config paths are requested by the skill. The README explicitly recommends letting Membrane handle API keys and not prompting users for secrets.
Persistence & Privilege
The skill is not always-enabled and is user-invocable; it does not request elevated privileges or modification of other skills' configs.
Assessment
This skill is internally consistent: it delegates auth and API calls to the Membrane CLI rather than asking for FileStack keys. Before installing or running commands, verify the Membrane CLI source (official @membranehq package or repo), prefer using a pinned CLI version or npx invocation for reproducibility, and avoid unnecessary global npm installs if you have policy concerns. Understand that Membrane will open a browser-based login flow and proxy requests to FileStack on your behalf—if you require full control over credentials, consider connecting to FileStack directly instead of via a third-party proxy.

Like a lobster shell, security has layers — review code before you run it.

latestvk976pq1a2agsfaptrz2fmjf4es846rjn

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments