Insided
v1.0.0InSided integration. Manage data, records, and automate workflows. Use when the user wants to interact with InSided data.
⭐ 0· 56·0 current·0 all-time
byMembrane Dev@membranedev
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (InSided integration) align with instructions: the SKILL.md tells the agent to use the Membrane CLI to discover connectors, create connections, run actions, and proxy raw API requests to InSided.
Instruction Scope
Instructions stay within the integration scope: they describe installing the Membrane CLI, logging in (browser-based auth), connecting to InSided, listing actions, running actions, and proxying requests. They do not ask the agent to read unrelated files, environment variables, or system paths.
Install Mechanism
Install is via npm install -g @membranehq/cli (public npm package). This is a typical install for a CLI but has the usual npm-global considerations (writes to system-wide location, runs third-party code). The source (npm/@membranehq) and linked GitHub repo should be verified before installing.
Credentials
Skill requests no environment variables or credentials in SKILL.md and explicitly instructs users not to supply API keys, instead using Membrane-managed connections. The requirement for a Membrane account is appropriate for the described workflow.
Persistence & Privilege
Skill is instruction-only, has no install manifest that writes additional files beyond the optional npm CLI. always is false and it does not request persistent elevated privileges or modify other skills/configs.
Assessment
This skill is coherent, but before installing: 1) verify the npm package publisher (@membranehq) and the referenced GitHub repo to ensure authenticity; 2) understand that Membrane will act as a proxy and hold credentials for your InSided connections — only use if you trust Membrane's service and storage/ACL practices; 3) installing the CLI with npm -g runs third-party code and writes to system locations—consider installing in a controlled environment or using a test account first; 4) confirm the browser-based login flow and permissions requested during connection; and 5) if you need stricter control, prefer using an account with limited scope or reviewing Membrane's privacy/security docs before proceeding.Like a lobster shell, security has layers — review code before you run it.
latestvk97ckwxbgwhcyba33dtk50ync584eje2
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
