Jelastic
v1.0.2Jelastic integration. Manage data, records, and automate workflows. Use when the user wants to interact with Jelastic data.
⭐ 0· 84·0 current·0 all-time
byMembrane Dev@membranedev
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description promise (Jelastic integration) matches the instructions: all actions are performed through the Membrane CLI and Membrane connections to Jelastic. No unrelated cloud credentials, binaries, or config paths are requested.
Instruction Scope
SKILL.md stays on-topic: it instructs installing/using the Membrane CLI, creating connections, listing/running actions, and proxying requests to the Jelastic API. It does not direct reading of unrelated local files, request unrelated credentials, or instruct exfiltration of arbitrary system data.
Install Mechanism
There is no formal install spec; the doc asks users/agents to run `npm install -g @membranehq/cli`. Installing a global npm package is expected for a CLI-based integration but carries the usual risks of installing third‑party packages (verify package authorship and registry).
Credentials
The skill requests no environment variables or secrets and explicitly defers credential management to Membrane connections. This is proportionate to the stated purpose.
Persistence & Privilege
always is false and the skill does not request persistent system-level changes or access to other skills' configuration. It relies on external Membrane server-side auth rather than storing local secrets.
Assessment
This skill is coherent for using Jelastic via Membrane. Before installing or running it: (1) verify the legitimacy of the npm package @membranehq/cli and the Membrane service (homepage/repository), (2) be aware the instructions ask to install a global npm package (exercise normal caution about third‑party packages), (3) the CLI will open a browser-based login (or print a headless URL/code) so follow those flows carefully and do not paste codes into untrusted places, and (4) if you allow an autonomous agent to invoke the skill, monitor any arbitrary `membrane request` calls since those proxy requests can access Jelastic endpoints on your behalf. If you need higher assurance, ask the publisher for a signed release or review the CLI source before installing.Like a lobster shell, security has layers — review code before you run it.
latestvk975cwdbqw6w61fwem93ng9pe584393c
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
