Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

InsForge Cli Skills

v1.0.0

Create and manage InsForge projects using the CLI. Handles authentication, project setup, database management, edge functions, storage, deployments, and secr...

1· 338·0 current·0 all-time
byTony Chang@tonychang04
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
The name/description (InsForge CLI for projects, DB, functions, storage, deployments, secrets) align with the commands and references provided. No unrelated credentials, binaries, or install steps are requested by the skill metadata. The CLI operations described (login, create, deploy, db query, secrets) match the stated purpose.
Instruction Scope
The SKILL.md instructs the agent for many high-impact actions that are appropriate for a CLI: starting a local auth callback server, storing tokens in ~/.insforge/credentials.json, running raw SQL, exporting/importing DB, zipping and uploading a project directory, invoking edge functions, and retrieving secrets. These actions are expected for a CLI but can access or transmit sensitive local data if misused (e.g., including .env files in a deployment zip, running an unrestricted SQL query, or using non-interactive password login). The docs explicitly warn about excluding .env and other sensitive files, which mitigates but does not eliminate the risk.
Install Mechanism
There is no install spec for the skill itself (instruction-only), which is low-risk. One instruction for project creation indicates the CLI will run `npx skills add insforge/agent-skills` to install agent skills into the project; installing code via npx is typical for scaffolding but introduces an execution-of-remote-package step that users should review before allowing.
Credentials
The skill metadata declares no required environment variables, but the documentation references several sensitive env vars (INSFORGE_ACCESS_TOKEN, INSFORGE_PROJECT_ID, INSFORGE_EMAIL, INSFORGE_PASSWORD, ANON_KEY, INSFORGE_BASE_URL, etc.). Those are expected for a CLI that supports non-interactive login, environment overrides, and edge functions; however they are high-sensitivity values and the skill would be able to read and use them if present. Tokens are stored locally at ~/.insforge/credentials.json per the docs.
Persistence & Privilege
The skill is not always-enabled and does not request elevated platform privileges. Typical side effects documented include writing .insforge/project.json in the project directory and installing agent skills under .agents/skills/insforge/, and storing credentials in ~/.insforge/credentials.json (0600). These are expected for a project-management CLI but do result in persistent files on disk and additions to the local project.
Assessment
This appears to be a coherent CLI skill for managing InsForge projects, but it performs high-impact operations. Before using or allowing automated agents to run it, consider: - Prefer interactive OAuth login rather than supplying INSFORGE_EMAIL/INSFORGE_PASSWORD in the environment or CI. Passwords and tokens referenced by the docs are sensitive and will be stored at ~/.insforge/credentials.json. - Review any npx package (e.g., `npx skills add insforge/agent-skills`) before it runs; installing remote npm packages executes external code. - When deploying, ensure you do not include .env or other secret files in the zipped upload — the docs list excluded files but accidental inclusion can cause data exfiltration. - Be cautious with `insforge db query` (raw SQL) and `insforge secrets get` — they can access sensitive data; restrict use and audit queries. - Check created files (.insforge/project.json, .agents/skills/) and permissions after project creation. If you want a lower-risk setup for automation, use least-privileged tokens, run commands in an isolated environment, and avoid non-interactive password usage unless credentials are stored securely in a secrets manager.

Like a lobster shell, security has layers — review code before you run it.

latestvk978w7m5mch7wbwpf9qdxqk5a1827vfj
338downloads
1stars
1versions
Updated 5h ago
v1.0.0
MIT-0

InsForge CLI

Command-line tool for managing InsForge Backend-as-a-Service projects.

Critical: Session Start Checks

insforge whoami    # verify authentication
insforge current   # verify linked project

If not authenticated: insforge login If no project linked: insforge create (new) or insforge link (existing)

Global Options

FlagDescription
--jsonStructured JSON output (for scripts and agents)
-y, --yesSkip confirmation prompts

Exit Codes

CodeMeaning
0Success
2Not authenticated
3Project not linked
4Resource not found
5Permission denied

Environment Variables

VariableDescription
INSFORGE_ACCESS_TOKENOverride stored access token
INSFORGE_PROJECT_IDOverride linked project ID
INSFORGE_EMAILEmail for non-interactive login
INSFORGE_PASSWORDPassword for non-interactive login

Commands

Authentication

  • insforge login — OAuth (browser) or --email for password login. See references/login.md
  • insforge logout — clear stored credentials
  • insforge whoami — show current user

Project Management

  • insforge create — create new project. See references/create.md
  • insforge link — link directory to existing project
  • insforge current — show current user + linked project
  • insforge list — list all orgs and projects

Database — insforge db

  • insforge db query <sql> — execute raw SQL. See references/db-query.md
  • insforge db tables / indexes / policies / triggers / functions — inspect schema
  • insforge db rpc <fn> [--data <json>] — call database function (GET if no data, POST if data)
  • insforge db export — export schema/data. See references/db-export.md
  • insforge db import <file> — import from SQL file. See references/db-import.md

Edge Functions — insforge functions

  • insforge functions list — list deployed functions
  • insforge functions code <slug> — view function source
  • insforge functions deploy <slug> — deploy or update. See references/functions-deploy.md
  • insforge functions invoke <slug> [--data <json>] [--method GET|POST] — invoke function

Storage — insforge storage

  • insforge storage buckets — list buckets
  • insforge storage create-bucket <name> [--private] — create bucket (default: public)
  • insforge storage delete-bucket <name> — delete bucket and all its objects (destructive)
  • insforge storage list-objects <bucket> [--prefix] [--search] [--limit] [--sort] — list objects
  • insforge storage upload <file> --bucket <name> [--key <objectKey>] — upload file
  • insforge storage download <objectKey> --bucket <name> [--output <path>] — download file

Deployments — insforge deployments

  • insforge deployments deploy [dir] — deploy frontend app. See references/deployments-deploy.md
  • insforge deployments list — list deployments
  • insforge deployments status <id> [--sync] — get deployment status (--sync fetches from Vercel)
  • insforge deployments cancel <id> — cancel running deployment

Secrets — insforge secrets

  • insforge secrets list [--all] — list secrets (values hidden; --all includes deleted)
  • insforge secrets get <key> — get decrypted value
  • insforge secrets add <key> <value> [--reserved] [--expires <ISO date>] — create secret
  • insforge secrets update <key> [--value] [--active] [--reserved] [--expires] — update secret
  • insforge secrets delete <key>soft delete (marks inactive; restore with --active true)

Schedules — insforge schedules

  • insforge schedules list — list all scheduled tasks (shows ID, name, cron, URL, method, active, next run)
  • insforge schedules get <id> — get schedule details
  • insforge schedules create --name --cron --url --method [--headers <json>] [--body <json>] — create a cron job (5-field cron format only)
  • insforge schedules update <id> [--name] [--cron] [--url] [--method] [--headers] [--body] [--active] — update schedule
  • insforge schedules delete <id> — delete schedule (with confirmation)
  • insforge schedules logs <id> [--limit] [--offset] — view execution logs

Logs — insforge logs

  • insforge logs <source> [--limit <n>] — fetch backend container logs (default: 20 entries)
SourceDescription
insforge.logsMain backend logs
postgREST.logsPostgREST API layer logs
postgres.logsPostgreSQL database logs
function.logsEdge function execution logs

Source names are case-insensitive: postgrest.logs works the same as postgREST.logs.

Documentation — insforge docs

  • insforge docs — list all topics
  • insforge docs instructions — setup guide
  • insforge docs <feature> <language> — feature docs (db / storage / functions / auth / ai / realtime × typescript / swift / kotlin / rest-api)

For writing application code with the InsForge SDK, use the insforge (SDK) skill instead, and use the insforge docs <feature> <language> to get specific SDK documentation.


Non-Obvious Behaviors

Functions invoke URL: invoked at {oss_host}/functions/{slug} — NOT /api/functions/{slug}. Exits with code 1 on HTTP 400+.

Secrets delete is soft: marks the secret inactive, not destroyed. Restore with insforge secrets update KEY --active true. Use --all with secrets list to see inactive ones.

Storage delete-bucket is hard: deletes the bucket and every object inside it permanently.

db rpc uses GET or POST: no --data → GET; with --data → POST.

Schedules use 5-field cron only: minute hour day month day-of-week. 6-field (with seconds) is NOT supported. Headers can reference secrets with ${{secrets.KEY_NAME}}.


Common Workflows

Set up database schema

insforge db query "CREATE TABLE posts (
  id UUID DEFAULT gen_random_uuid() PRIMARY KEY,
  title TEXT NOT NULL,
  content TEXT,
  author_id UUID REFERENCES auth.users(id),
  created_at TIMESTAMPTZ DEFAULT now()
)"
insforge db query "ALTER TABLE posts ENABLE ROW LEVEL SECURITY"
insforge db query "CREATE POLICY \"public_read\" ON posts FOR SELECT USING (true)"
insforge db query "CREATE POLICY \"owner_write\" ON posts FOR INSERT WITH CHECK (auth.uid() = author_id)"

FK to users: always auth.users(id). RLS current user: auth.uid().

Deploy an edge function

# Default source path: insforge/functions/{slug}/index.ts
insforge functions deploy my-handler
insforge functions invoke my-handler --data '{"action": "test"}'

Deploy frontend

Always verify the local build succeeds before deploying. Local builds are faster to debug and don't waste server resources.

# 1. Build locally first
npm run build

# 2. Deploy
insforge deployments deploy ./dist --env '{"VITE_API_URL": "https://my-app.us-east.insforge.app"}'

Environment variable prefix by framework:

FrameworkPrefixExample
ViteVITE_VITE_INSFORGE_URL
Next.jsNEXT_PUBLIC_NEXT_PUBLIC_INSFORGE_URL
Create React AppREACT_APP_REACT_APP_INSFORGE_URL
AstroPUBLIC_PUBLIC_INSFORGE_URL
SvelteKitPUBLIC_PUBLIC_INSFORGE_URL

Pre-deploy checklist:

  • npm run build succeeds locally
  • All required env vars configured with correct framework prefix
  • Edge function directories excluded from frontend build (if applicable)
  • Never include node_modules, .git, .env, .insforge, or build output in the zip
  • Build output directory matches framework's expected output (dist/, build/, .next/, etc.)

Backup and restore database

insforge db export --output backup.sql
insforge db import backup.sql

Schedule a cron job

# Create a schedule that calls a function every 5 minutes
insforge schedules create \
  --name "Cleanup Expired" \
  --cron "*/5 * * * *" \
  --url "https://my-app.us-east.insforge.app/functions/cleanup" \
  --method POST \
  --headers '{"Authorization": "Bearer ${{secrets.API_TOKEN}}"}'

# Check execution history
insforge schedules logs <id>

Cron Expression Format

InsForge uses 5-field cron expressions (pg_cron format). 6-field expressions with seconds are NOT supported.

┌─────────────── minute (0-59)
│ ┌───────────── hour (0-23)
│ │ ┌─────────── day of month (1-31)
│ │ │ ┌───────── month (1-12)
│ │ │ │ ┌─────── day of week (0-6, Sunday=0)
│ │ │ │ │
* * * * *
ExpressionDescription
* * * * *Every minute
*/5 * * * *Every 5 minutes
0 * * * *Every hour (at minute 0)
0 9 * * *Daily at 9:00 AM
0 9 * * 1Every Monday at 9:00 AM
0 0 1 * *First day of every month at midnight
30 14 * * 1-5Weekdays at 2:30 PM

Secret References in Headers

Headers can reference secrets stored in InsForge using the syntax ${{secrets.KEY_NAME}}.

{
  "headers": {
    "Authorization": "Bearer ${{secrets.API_TOKEN}}",
    "X-API-Key": "${{secrets.EXTERNAL_API_KEY}}"
  }
}

Secrets are resolved at schedule creation/update time. If a referenced secret doesn't exist, the operation fails with a 404 error.

Best Practices

  1. Use 5-field cron expressions only

    • pg_cron does not support seconds (6-field format)
    • Example: */5 * * * * for every 5 minutes
  2. Store sensitive values as secrets

    • Use ${{secrets.KEY_NAME}} in headers for API keys and tokens
    • Create secrets first via the secrets API before referencing them
  3. Target InsForge functions for serverless tasks

    • Use the function URL format: https://your-project.region.insforge.app/functions/{slug}
    • Ensure the target function exists and has status: "active"
  4. Monitor execution logs

    • Check logs regularly to ensure schedules are running successfully
    • Look for non-200 status codes and failed executions

Common Mistakes

MistakeSolution
Using 6-field cron (with seconds)Use 5-field format only: minute hour day month day-of-week
Referencing non-existent secretCreate the secret first via secrets API
Targeting non-existent functionVerify function exists and is active before scheduling
Schedule not runningCheck isActive is true and cron expression is valid

Recommended Workflow

1. Create secrets if needed     -> `insforge secrets add KEY VALUE`
2. Create/verify target function -> `insforge functions list`
3. Create schedule              -> `insforge schedules create`
4. Verify schedule is active    -> `insforge schedules get <id>`
5. Monitor execution logs       -> `insforge schedules logs <id>`

Debug with logs

insforge logs function.logs          # function execution issues
insforge logs postgres.logs          # database query problems
insforge logs insforge.logs          # API / auth errors
insforge logs postgrest.logs --limit 50

Best Practices

  1. Start with function.logs for function issues

    • Check execution errors, timeouts, and runtime exceptions
  2. Use postgres.logs for query problems

    • Debug slow queries, constraint violations, connection issues
  3. Check insforge.logs for API errors

    • Authentication failures, request validation, general backend errors

Common Debugging Scenarios

ProblemCheck
Function not workingfunction.logs
Database query failingpostgres.logs, postgREST.logs
Auth issuesinsforge.logs
API returning 500 errorsinsforge.logs, postgREST.logs

Non-interactive CI/CD

INSFORGE_EMAIL=$EMAIL INSFORGE_PASSWORD=$PASSWORD insforge login --email -y
insforge link --project-id $PROJECT_ID --org-id $ORG_ID -y
insforge db query "SELECT count(*) FROM users" --json

Project Configuration

After create or link, .insforge/project.json is created:

{
  "project_id": "...",
  "appkey": "...",
  "region": "us-east",
  "api_key": "ik_...",
  "oss_host": "https://{appkey}.{region}.insforge.app"
}

oss_host is the base URL for all SDK and API operations. api_key is the admin key for backend API calls.

Never commit this file to version control or share it publicly. Do not edit this file manually. Use insforge link to switch projects.

Comments

Loading comments...