Makelog
v1.0.0Makelog integration. Manage data, records, and automate workflows. Use when the user wants to interact with Makelog data.
⭐ 0· 27·0 current·0 all-time
byMembrane Dev@membranedev
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill claims to integrate with Makelog and all runtime steps use the Membrane CLI to discover connectors, create connections, run actions, and proxy API requests — these are coherent and expected for a Makelog integration.
Instruction Scope
Instructions are limited to installing and using the Membrane CLI, authenticating, listing/ running actions, and proxying requests to Makelog. The proxy feature can send arbitrary requests to the Makelog API (expected for a proxy), so users should avoid sending unrelated sensitive data through it.
Install Mechanism
There is no embedded install spec; the SKILL.md asks the user to run `npm install -g @membranehq/cli`. Installing a global npm package is expected for a CLI, but it does run third-party code on the machine — verify the package origin (official @membranehq) and consider installing in an isolated environment if you have concerns.
Credentials
The skill requests no environment variables or credentials and explicitly instructs to use Membrane-managed connections rather than asking for API keys — this is proportional and appropriate for the stated purpose.
Persistence & Privilege
The skill does not request always:true or system-wide configuration changes. It's instruction-only and relies on a CLI the user installs; it does not demand persistent elevated privileges.
Assessment
This skill is internally consistent: it expects you to install and use the official Membrane CLI to connect to Makelog and run actions. Before installing, verify the npm package name (@membranehq/cli) on the official Membrane site or GitHub, and consider installing the CLI in an isolated environment (container or VM) if you want to limit risk. Be cautious when using the `membrane request` proxy: it can send arbitrary API requests and include credentials managed by Membrane, so do not proxy unrelated sensitive data through it. If you are unsure about trusting the Membrane service, review its privacy/security documentation and the CLI repository before proceeding.Like a lobster shell, security has layers — review code before you run it.
latestvk978603yxb45n85x5ks74g0cnn846vgz
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
