velen-cli

Use when the user wants to inspect company or customer data that lives behind Velen, run ad hoc read-only SQL against a Velen-connected source, or verify or extend a known Velen insight by public ID. Do not use for local databases, direct credentials, or SQL work that bypasses Velen access controls.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "velen-cli" with this command: npx skills add wordbricks/skills/wordbricks-skills-velen-cli

Velen CLI

Use velen when you need auditable terminal access to a company's Velen-connected data. Prefer it over ad hoc credentials because auth, org access, and source capability checks are enforced by the CLI and server.

Overview

This skill is for read-only analysis through Velen-managed access.

  • Use it when the user wants company or customer data that is expected to be available through Velen, wants to validate a metric with ad hoc SQL, or already has a Velen insight public ID to inspect.
  • Do not use it for local databases, direct credentials, write operations, DDL, or product/documentation questions that do not require CLI access.
  • Comment: Provider-specific sources are still in scope when Velen is the access path. If the user asks for "warehouse data", "customer metrics", or "run a quick SQL check" without naming Velen, prefer this skill when the expected path is Velen-managed rather than direct credentials.

Prerequisites

  • velen must be available in the environment.
  • The user must be able to complete browser login if velen auth login is required.
  • Install and login may require network access, permission to install global packages, and an interactive browser/device-code authorization step.
  • The task must stay read-only.

Required Workflow

Follow these steps in order. Do not skip steps.

Step 1: Confirm CLI availability and auth

  1. Run command -v velen.
  2. If velen is missing, install it with npm install -g @wordbricks/velen.
  3. Run velen auth whoami.
  4. If auth is missing or expired, run velen auth login and complete browser authorization.

Step 2: Resolve org context

  1. Run velen org current.
  2. If the active org is unclear or wrong, run velen org list.
  3. If velen org current is unresolved or shows Org: <none>, do not run source commands without an org. Either run velen org use <slug> to persist the org for later commands or pass --org <slug> on every subsequent command.
  4. Prefer --org <slug> for one-off investigations when you are not confident the rest of the session should stay pinned to that org.

Step 3: Choose the right source or insight entry point

  1. If the user already has an insight public ID, start with velen insight get <PUBLIC_ID>.
  2. If the user gives a product, environment, or nickname rather than a known source key, treat it as an alias to resolve, not as a literal source. Run velen source list in the chosen org, narrow by the most relevant product name or provider when possible, prefer exact source-key or source-name matches first, then obvious prefix matches, and report ambiguity before querying if multiple queryable sources still fit.
  3. Otherwise run velen source list and choose a source where QUERY is yes.
  4. Run velen source show <source_key> to confirm provider, org, status, and query support before writing SQL.

Step 4: Run the smallest useful read-only operation

  1. For SQL work, start with a cheap validation query such as select 1, a row count, or a bounded aggregate.
  2. Use provider-appropriate read-only SQL only.
  3. Prefer --file <path.sql> or --stdin for multi-line SQL.
  4. If output is truncated or too broad, narrow the query and rerun with stronger filters, bounded dates, or smaller limits.

Step 5: Summarize evidence and next action

  1. Report the org, source, and query or insight used.
  2. Call out any ambiguity in source choice, org context, or missing insight ID.
  3. If more evidence is needed, propose the next smallest follow-up query.

Failure Handling

  • If a failure includes Request ID, include it in the summary so the run can be traced or escalated.

References

  • Read references/command-patterns.md for concrete command sequences, scenario patterns, and recovery moves.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Coding

Self Updater

⭐ OPEN SOURCE! GitHub: github.com/GhostDragon124/openclaw-self-updater ⭐ ONLY skill with Cron-aware + Idle detection! Auto-updates OpenClaw core & skills, an...

Registry SourceRecently Updated
1171Profile unavailable
Coding

ClawHub CLI Assistant

Use the ClawHub CLI to publish, inspect, version, update, sync, and troubleshoot OpenClaw skills from the terminal.

Registry SourceRecently Updated
1.9K2Profile unavailable
Coding

SkillTree Learning Progress Tracker

Track learning across topics like an RPG skill tree. Prerequisites, milestones, suggested next steps. Gamified learning path.

Registry SourceRecently Updated
900Profile unavailable
Coding

Speak Turbo - Talk to your Claude 90ms latency!

Give your agent the ability to speak to you real-time. Talk to your Claude! Ultra-fast TTS, text-to-speech, voice synthesis, audio output with ~90ms latency....

Registry SourceRecently Updated
4480Profile unavailable