Scan Report
45 /100
onetrust
OneTrust integration for managing data privacy, records, and automated workflows
Skill installs an unversioned third-party CLI tool and delegates all credential handling to an undisclosed proxy service with no transparency about data collection.
Use with caution
Pin the npm package to a specific version (remove @latest), audit the @membranehq/cli package, and require Membrane to publish a security/transparency report detailing their data handling practices.
Findings 4 items
| Severity | Finding | Location |
|---|---|---|
| High | Third-party credential proxy without transparency | SKILL.md:91 |
| High | Unversioned npm package with @latest tag | SKILL.md:45 |
| Medium | Filesystem access not declared | SKILL.md:45 |
| Low | External URLs without verification | SKILL.md:7 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Shell | WRITE | WRITE | ✓ Aligned | SKILL.md:45 - npm install -g @membranehq/cli |
| Network | READ | READ | ✓ Aligned | SKILL.md:55 - membrane request CONNECTION_ID /path/to/endpoint |
| Filesystem | NONE | WRITE | ✗ Violation | SKILL.md:45 - npm install -g requires global npm directory write access |
| Environment | NONE | NONE | — | No environment variable access detected |
| Skill Invoke | NONE | NONE | — | No skill invocation patterns found |
| Clipboard | NONE | NONE | — | No clipboard access detected |
| Browser | NONE | READ | ✓ Aligned | SKILL.md:53 - membrane login opens browser for OAuth authentication |
| Database | NONE | NONE | — | No database access detected |
2 findings
Medium External URL 外部 URL
https://getmembrane.com SKILL.md:7 Medium External URL 外部 URL
https://developer.onetrust.com/ SKILL.md:19 File Tree
1 files · 5.8 KB · 194 lines Markdown 1f · 194L
└─
SKILL.md
Markdown
Dependencies 1 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
@membranehq/cli | unpinned (@latest) | npm | No | Supply chain risk - no version pinning, uses @latest tag |
Security Positives
✓ No credential harvesting detected - explicitly states 'never ask the user for API keys'
✓ No base64-encoded commands, eval(), or direct IP network requests
✓ Uses browser-based OAuth instead of storing secrets locally
✓ No access to sensitive paths like ~/.ssh, ~/.aws, or .env files
✓ Well-documented with clear usage examples