Claude-skill-registry amplitude-user-lookup

install
source · Clone the upstream repo
git clone https://github.com/majiayu000/claude-skill-registry
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/majiayu000/claude-skill-registry "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/data/amplitude-user-lookup" ~/.claude/skills/majiayu000-claude-skill-registry-amplitude-user-lookup && rm -rf "$T"
manifest: skills/data/amplitude-user-lookup/SKILL.md
safety · automated scan (low risk)
This is a pattern-based risk scan, not a security review. Our crawler flagged:
  • makes HTTP requests (curl)
  • references API keys
Always read a skill's source content before installing. Patterns alone don't mean the skill is malicious — but they warrant attention.
source content

Amplitude User Lookup

Query Amplitude user data via REST API using Device ID or User ID.

Prerequisites

Set environment variables:

export AMPLITUDE_API_KEY="your-api-key"
export AMPLITUDE_SECRET_KEY="your-secret-key"
export AMPLITUDE_REGION="us"  # or "eu" for EU data residency

Get keys from: Amplitude Dashboard > Settings > Projects > General

Quick Start

1. Search User (Device ID -> Amplitude ID)

python scripts/user_search.py "DEVICE-ID-HERE"

2. Get User Activity

python scripts/user_activity.py AMPLITUDE_ID --limit 50

Combined Workflow

# Get Amplitude ID first
AMP_ID=$(python scripts/user_search.py "DEVICE-ID" --json | jq -r '.matches[0].amplitude_id')

# Then get activity
python scripts/user_activity.py $AMP_ID --limit 100

Script Options

ScriptOptions
user_search.py
--json
for raw JSON output
user_activity.py
--limit N
,
--offset N
,
--direction [latest|earliest]
,
--json

Rate Limits

  • User Search/Activity: 360 requests/hour
  • Concurrent requests: 5 max

References