velen-cli
SKILL.md
Velen CLI
Use velen when you need auditable terminal access to a company's Velen-connected data. Prefer it over ad hoc credentials because auth, org access, and source capability checks are enforced by the CLI and server.
Overview
This skill is for read-only analysis through Velen-managed access.
- Use it when the user wants company or customer data that is expected to be available through Velen, wants to validate a metric with ad hoc SQL, or already has a Velen insight public ID to inspect.
- Do not use it for local databases, direct credentials, write operations, DDL, or product/documentation questions that do not require CLI access.
- Comment: Provider-specific sources are still in scope when Velen is the access path. If the user asks for "warehouse data", "customer metrics", or "run a quick SQL check" without naming Velen, prefer this skill when the expected path is Velen-managed rather than direct credentials.
Prerequisites
velenmust be available in the environment.- The user must be able to complete browser login if
velen auth loginis required. - Install and login may require network access, permission to install global packages, and an interactive browser/device-code authorization step.
- The task must stay read-only.
Required Workflow
Follow these steps in order. Do not skip steps.
Step 1: Confirm CLI availability and auth
- Run
command -v velen. - If
velenis missing, install it withnpm install -g @wordbricks/velen. - Run
velen auth whoami. - If auth is missing or expired, run
velen auth loginand complete browser authorization.
Step 2: Resolve org context
- Run
velen org current. - If the active org is unclear or wrong, run
velen org list. - If
velen org currentis unresolved or showsOrg: <none>, do not run source commands without an org. Either runvelen org use <slug>to persist the org for later commands or pass--org <slug>on every subsequent command. - Prefer
--org <slug>for one-off investigations when you are not confident the rest of the session should stay pinned to that org.
Step 3: Choose the right source or insight entry point
- If the user already has an insight public ID, start with
velen insight get <PUBLIC_ID>. - If the user gives a product, environment, or nickname rather than a known source key, treat it as an alias to resolve, not as a literal source. Run
velen source listin the chosen org, narrow by the most relevant product name or provider when possible, prefer exact source-key or source-name matches first, then obvious prefix matches, and report ambiguity before querying if multiple queryable sources still fit. - Otherwise run
velen source listand choose a source whereQUERYisyes. - Run
velen source show <source_key>to confirm provider, org, status, and query support before writing SQL.
Step 4: Run the smallest useful read-only operation
- For SQL work, start with a cheap validation query such as
select 1, a row count, or a bounded aggregate. - Use provider-appropriate read-only SQL only.
- Prefer
--file <path.sql>or--stdinfor multi-line SQL. - If output is truncated or too broad, narrow the query and rerun with stronger filters, bounded dates, or smaller limits.
Step 5: Summarize evidence and next action
- Report the org, source, and query or insight used.
- Call out any ambiguity in source choice, org context, or missing insight ID.
- If more evidence is needed, propose the next smallest follow-up query.
Failure Handling
- If a failure includes
Request ID, include it in the summary so the run can be traced or escalated.
References
- Read
references/command-patterns.mdfor concrete command sequences, scenario patterns, and recovery moves.
Weekly Installs
3
Repository
wordbricks/skillsFirst Seen
5 days ago
Security Audits
Installed on
amp3
cline3
opencode3
cursor3
kimi-cli3
codex3