Pitchly
v1.0.0Pitchly integration. Manage data, records, and automate workflows. Use when the user wants to interact with Pitchly data.
⭐ 0· 72·0 current·0 all-time
byMembrane Dev@membranedev
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (Pitchly integration) align with the instructions: the SKILL.md purely describes how to use the Membrane CLI to connect to Pitchly and run actions. Nothing requested (no extra env vars, no unrelated binaries) appears out of scope.
Instruction Scope
Runtime instructions are limited to installing/using the Membrane CLI, logging in (browser-based auth), creating connections, listing actions, running actions, and optionally proxying requests via Membrane. The doc does not instruct reading unrelated files, environment variables, or exfiltrating data to unexpected endpoints.
Install Mechanism
There is no packaged install spec in the registry; the SKILL.md recommends installing a global npm CLI (npm install -g @membranehq/cli) or using npx. This is expected for a CLI-based integration but carries the usual caveats of installing global npm packages (writes to disk, requires privileges).
Credentials
The skill requests no environment variables or secrets. It explicitly instructs to let Membrane manage credentials and browser-based authentication, which is proportionate to the described purpose.
Persistence & Privilege
The skill does not request always:true and is user-invocable only. It does not instruct modifying other skills or system-wide configs.
Assessment
This skill is coherent and uses Membrane as an intermediary for Pitchly access. Before installing: (1) verify you trust @membranehq/cli (review its npm package and repository), (2) prefer using npx for one-off use to avoid a global install if you want less system impact, (3) be aware the CLI opens a browser for auth and Membrane will handle credentials server-side, and (4) run the CLI in an environment you control (or sandbox) if you have strict security policies.Like a lobster shell, security has layers — review code before you run it.
latestvk975svh375tz0ypbsa6e6jyxx18444sh
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
