Claude-skill-registry amplitude-user-lookup
install
source · Clone the upstream repo
git clone https://github.com/majiayu000/claude-skill-registry
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/majiayu000/claude-skill-registry "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/data/amplitude-user-lookup" ~/.claude/skills/majiayu000-claude-skill-registry-amplitude-user-lookup && rm -rf "$T"
manifest:
skills/data/amplitude-user-lookup/SKILL.mdsafety · automated scan (low risk)
This is a pattern-based risk scan, not a security review. Our crawler flagged:
- makes HTTP requests (curl)
- references API keys
Always read a skill's source content before installing. Patterns alone don't mean the skill is malicious — but they warrant attention.
source content
Amplitude User Lookup
Query Amplitude user data via REST API using Device ID or User ID.
Prerequisites
Set environment variables:
export AMPLITUDE_API_KEY="your-api-key" export AMPLITUDE_SECRET_KEY="your-secret-key" export AMPLITUDE_REGION="us" # or "eu" for EU data residency
Get keys from: Amplitude Dashboard > Settings > Projects > General
Quick Start
1. Search User (Device ID -> Amplitude ID)
python scripts/user_search.py "DEVICE-ID-HERE"
2. Get User Activity
python scripts/user_activity.py AMPLITUDE_ID --limit 50
Combined Workflow
# Get Amplitude ID first AMP_ID=$(python scripts/user_search.py "DEVICE-ID" --json | jq -r '.matches[0].amplitude_id') # Then get activity python scripts/user_activity.py $AMP_ID --limit 100
Script Options
| Script | Options |
|---|---|
| for raw JSON output |
| , , , |
Rate Limits
- User Search/Activity: 360 requests/hour
- Concurrent requests: 5 max
References
- API Reference: curl examples, response schemas, error codes
- Scripts Guide: detailed script usage and examples