deAPI - AI Media Generation Toolkit

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This is a coherent deAPI media toolkit, but it sends user-provided text/media to deAPI and uses a deAPI API key, so users should consider privacy and account-credit impact.

Install if you are comfortable sending selected prompts, media files, URLs, and text to deAPI for processing. Set a dedicated DEAPI_API_KEY, review files before upload, avoid sensitive content unless deAPI is an acceptable processor for it, and implement webhook signature checks if using server integrations.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Using the skill can consume credits or reveal account balance for the deAPI account tied to the API key.

Why it was flagged

The skill needs a deAPI account credential to submit jobs and check balance; this is purpose-aligned and disclosed, but the registry metadata does not list a required env var or primary credential.

Skill content
Requires `DEAPI_API_KEY` environment variable: export DEAPI_API_KEY=your_key
Recommendation

Use a service-specific deAPI key, monitor account usage, and avoid placing broader credentials in the DEAPI_API_KEY variable.

What this means

A mistaken file path or URL could send unintended media to a third-party processing service.

Why it was flagged

The command template uploads a user-selected local image file to deAPI via curl, which is expected for image upscaling but should be user-confirmed.

Skill content
curl -s -X POST https://api.deapi.ai/api/v1/client/img-upscale ... -F image=@{local_file_path}
Recommendation

Confirm the exact file path, URL, and prompt before running media commands, especially for private or copyrighted content.

What this means

Private text embedded and saved for later use may be reused in future search or retrieval workflows.

Why it was flagged

The embedding command can turn user text into vectors for later search or RAG use; this is core functionality and appears user-directed, but embeddings may preserve sensitive meaning.

Skill content
Offer to save or use the embedding ... Use cases: Semantic search, RAG
Recommendation

Only embed and save text that is appropriate for reuse, and store generated embeddings in a location with suitable access controls.

What this means

If webhook verification is skipped, an exposed endpoint could accept spoofed job-completion events or untrusted result URLs.

Why it was flagged

The setup command documents optional webhook and websocket result delivery; it includes signature-verification guidance, but secure handling depends on the user's implementation.

Skill content
Add `webhook_url` to any request ... Security: Verify signature in `X-DeAPI-Signature` header (HMAC-SHA256).
Recommendation

Verify webhook signatures, restrict webhook endpoints where practical, validate event fields, and treat result URLs as untrusted until checked.